This work was supported by the TRUST Center (NSF award number CCF-0424422) Introduction In 1995 Mary J. Culnan stated that ‘fair information practices.

Slides:



Advertisements
Similar presentations
This work was supported by the TRUST Center (NSF award number CCF ) Background In order to subsidize free services to consumers, web sites often.
Advertisements

This work was supported by the TRUST Center (NSF award number CCF ) 1 Introduction Within the last few years, online advertisement companies have.
Back to Table of Contents
Evaluate 1. Assessment of value ٠ the act of considering or examining something in order to judge its value, quality, importance, extent, or condition.
Lauren Thomas 1,3 Chris Hoofnagle, JD 2 Ashkan Soltani, MIMS 2 Louisiana State University 1 University of California, Berkeley 2 SUPERB-TRUST REU 3 Do.
Higher Education: Improved Tax Information Could Help Families Pay for College (GAO ) Presentation at the 30 th Annual SFARN Conference June 21,
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Electronic Commerce Systems
Chapter 9 e-Commerce Systems.
ASPEC Internal Auditor Training Version
© 2004 Keynote Systems Customer Experience Management (CEM) Bonny Brown, Ph.D. Director, Research & Public Services.
Quality Representative Training Version
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
How to Assess Student Learning in Arts Partnerships Part II: Survey Research Revised April 2, 2012 Mary Campbell-Zopf, Ohio Arts Council
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
Improving Internet Surfing.  Company started in  Currently subsidiary of Amazon.com.  Main objective: provide information about almost every.
Senior Thesis: Review of Literature Samples, Citation help, Search techniques.
This work was supported by the TRUST Center (NSF award number CCF ) Methods Data Collection: 1. Start Sever on the host OS: This creates a sanitized.
KNOWLEDGE DATABASE Topics inside  Document sharing  Event marketing  Web content.
Abstract Introduction Results and Discussions James Kasson  (Dr. Bruce W.N. Lo)  Information Systems  University of Wisconsin-Eau Claire In a world.
This work was supported by the TRUST Center (NSF award number CCF ) Third Party Information Sharing Disclosure Practices Cody Rigney – Youngstown.
Building a site on the World Wide Web requires more than simply learning the HTML language and starting out. You need to get a place to put your Web pages,
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
1 Building the Knowledge Base. 2 New Parameters In crossing international borders, a firm encounters parameters not found in domestic business. Examples.
The Research Process Outlets–the Place Decision 2.
Lesli Scott Ashley Bowers Sue Ellen Hansen Robin Tepper Jacob Survey Research Center, University of Michigan Third International Conference on Establishment.
E-P RAGUE AND THE P ROSPECTS OF E-G OVERNMENT : D ISCUSSION P ANELS James Melitski, PhD and Tony Carrizales, PhD E-governance Institute National Center.
1 WS-Privacy Paul Bui Ryan Dickey. 2 Agenda  WS-Privacy  Introduction to P3P  How P3P Works  P3P Details  A P3P Scenario  Conclusion  References.
U.S. International Travel Statistics OECD Working Party on International Trade in Goods and Trade in Services Statistics Robert E. Yuskavage.
Optimizing Marketing Spend Through Multi-Source Conversion Attribution David Jenkins.
 2001,Hamsi. All rights reserved. branding in the virtual world.
Status of the Internet as a Tool for Health Behavior Change Kerry Evers, Ph.D. Carol Cummins, M.Ed., MLIS Mary-Margaret Driskell, M.P.H. James Prochaska,
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Hidden Surveillance by Consumer Health Information Websites Jacquelyn Burkell and Alexandre Fortier Faculty of Information and Media Studies University.
Internet Sources Perkins County Schools 5th Grade NETA 2012 Objective: To find and verify internet sources that are reliable.
ITGS Databases.
Business and Management Research
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Research Skills. Electronic Sources of Information Search Engines Search Engines Databases Databases Communication Communication Tools Tools.
Statement on Auditing Standards (SAS) No. 70, Service Organizations BADM 559 Final Project By: Kristina Morales.
Searching The Internet And Evaluating Internet Information.
Hey there! Have you evaluated? Is that site good enough to cite?
Risks and Protection. What are the risks of shopping online? Spend 2 minutes identifying risks associated with shopping online card details could be stolen.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
Chapter 4: Marketing on the Web. 2 How do you reach customers? Identify groups of potential customers Select the appropriate media Build the right message.
We believe in qualitative quantity
Library Patron Privacy in Jeopardy An analysis of the privacy policies of digital content vendors ASIS&T General Meeting 2015 April Lambert, Michelle Parker.
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
Introduction to NCHS Rob Weinzimer, Special Assistant for Outreach Centers for Disease Control and Prevention National Center for Health Statistics.
Chapter 29 Conducting Market Research. Objectives  Explain the steps in designing and conducting market research  Compare primary and secondary data.
Technology for Control, Social Business, and Big Data
Evaluating Sources: How Credible Are They?
Impact Of Online Advertising On Consumer Behaviour By Thatipalli Sagar 10cqcma108 Under The Guidance Of Dr. Maruthi Ram. R.
Opinion spam and Analysis 소프트웨어공학 연구실 G 최효린 1 / 35.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Dr.V.Jaiganesh Professor
AP CSP: Performance Task - Explore
Discover How Your Business Can Benefit from a Facebook Fanpage
Discover How Your Business Can Benefit from a Facebook Fanpage
Service Organization Control (SOC)
INF 103 Education for Service-- snaptutorial.com.
INF 103 Teaching Effectively-- snaptutorial.com
Business and Management Research
Reach prospects early in the buying cycle with White Papers.
Problems when using the Internet?
Planning and Writing your Thesis
Outlets–the Place Decision
Online health and community indicator platforms
Presentation transcript:

This work was supported by the TRUST Center (NSF award number CCF ) Introduction In 1995 Mary J. Culnan stated that ‘fair information practices reflect three conditions of ‘knowledge, notice, and no’. First, consumers must be aware that personal information has been collected. Next, consumers must also be aware that their personal information may be shared with third parties. Finally, consumers must also be able to restrict their personal information from being shared with third parties if they choose.” The current industry practice is to meet the obligations of knowledge and notice by creating and posting a privacy policy/statement on their company’s website. The issue with current practice is that there are no real guidelines or rules in place to ensure that these documents are written understandably so that if read, they actually fulfill their stated purpose which is to give consumers knowledge and notice of a company’s information practices. There have been a number of studies conducted on the readability of privacy policies. These studies have tended to focus on either health industry specific policies or on those websites found to be ranked very high on popular website lists. This fails to capture the readability of the privacy policies of those websites who should most be required to ensure that their customers have both knowledge and notice, i.e. those websites actively engaged in selling their customers’ information. Many companies sell consumer data to third parties such as list brokers or direct marketers. The list broker industry is involved in the sale of huge volumes of personally-identifiable information linked to sensitive behavioral, medical, and demographic elements to almost anyone who wishes to purchase it. These list brokers advertise their databases through list search services such as NextMark, a freely available online service, which hosts 60,000 advertisements for list rentals known as “data cards”. The NextMark service claims that it contains over 37,000 data cards advertising consumer lists and 8,870 data cards advertising lists. Methodology Created Web Crawler using Python Collected “data cards” from Verified origin of information in data cards Removed duplicated data cards and URLs Collected privacy policies from web sites selling their customers’ information Analyzed privacy policies using style.exe available from Separated Statistics on the Privacy Policies according to whether the company’s practices violated their privacy policies, did not violate their privacy policies, or whether their privacy policy was ambiguous Created pivot tables comparing the readability statistics of the different categories of privacy policies Results How long does it take to read an average privacy policy? The average American adult reads at an average rate of words per minute ( The average word count of the privacy policies examined was 1436 words. It would take an average adult approximately 6 minutes to read a privacy policy of average length How difficult is it to understand an average privacy policy? The average American adult reads at the 8 th grade level The privacy policies in our sample earned an average of approximately 13.6 across multiple readability tests Is there a correlation between the popularity of a web site and its privacy policy? No Privacy Policy Language Author: Robert Carlson Faculty Advisor: Chris Hoofnagle, J.D. and Nathan Good, Ph.D. Implications Given that the average American adult reads at approximately 5.5 levels below the level of the average privacy policy and would take approximately 6 minutes to read it if they were not struggling to comprehend what they were reading, and there seems to be no correlation between the popularity of a web site and the complexity and length of its privacy policy, the logical conclusion is that the average American adult is not reading these privacy policies and, if they are reading them, then they are most likely not understanding what they are reading. This being the case, it seems disingenuous to claim that privacy policies are providing adequate knowledge and notice of a company’s information practices and thus these companies, knowingly are not, are engaging in unfair information practices. Further Work Evaluate the evolution of privacy policies over time Conduct usability tests on privacy policies to gain a better understanding of their effectiveness Compare the readability of privacy sections of websites with other comparable sections of the site such as the terms of service, FAQs, and support pages