Skip to main content

Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce Practices

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3184))

Abstract

Although e-commerce systems are increasingly concerned with data protection, they follow a property-based approach to privacy which leads to privacy negotiation and bargaining upon the base of the data subjects’ consent. After considering the technological and regulative strategies of protecting consumer privacy, this paper discusses the shortcomings of that approach and claims that, as long as a general privacy culture has not yet evolved in the (web) society, it might collide with the notion of data protection as a fundamental right.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adkinson, W., Eisenach, J., Lenard, T.: Privacy Online: A Report on the Information Practices and Policies of Commercial Websites, Washington, PFF (2002)

    Google Scholar 

  2. Banisar, D., Davies, S.: Global Trends in Privacy Protection. An International Survey of Privacy, Data Protection and Surveillance Laws and Developments, The John Marshall Journal of Computer & Information Law XVIII(1), 1–111 (1999)

    Google Scholar 

  3. Borking, J.: Proposal for building a privacy guardian for the electronic age, Registrariekamer, Den Haag (2000)

    Google Scholar 

  4. Borking, J., Raab, C.: Laws, PETs and Other Technologies for Privacy Protection. The Journal of Information, Law and Technology 1(1) (2001)

    Google Scholar 

  5. Cavoukian, A., Hamilton, T.J.: The Privacy Payoff. How Successful Business Build Customer Trust. McGraw-Hill and Ryerson, Toronto (2002)

    Google Scholar 

  6. Challis, W.S., Cavoukian, A.: The Case for a US Privacy Commissioner: A Canadian Commissioner’s Perspective. The John Marshall Journal of Computer & Information Law XIX(1), 1–36 (2000)

    Google Scholar 

  7. Farell, H.: Hybrid Institutions and the Law: Outlaw Arrangements or Interface Solutions. Zeitschrift für Rechtsoziologie 23, 25–40 (2002)

    Google Scholar 

  8. Federal Trade Commission, On-line Profiling: A Report to Congress (2000)

    Google Scholar 

  9. Garfinkel, S.: Database Nation: The Death of Privacy in the 21st Century. O’Reilly and Associates, Cambridge (2000)

    Google Scholar 

  10. Godin, S.: Permission Marketing. Simon and Schuster, New York (1999)

    Google Scholar 

  11. Goldsmith, J.: Unilateral Regulation of the Internet: A Modest Defense. European Journal of International Law 11(1), 135–148 (2000)

    Article  MathSciNet  Google Scholar 

  12. Hagel, J., Singer, M.: Net Worth: Shaping Markets When Customers Make the Rules. Harvard Business School Press, Cambridge (1999)

    Google Scholar 

  13. Heydebrand, W.: From Globalization of Law to Law under Globalization. In: Nelken, D., Feest, J. (eds.) Adapting Legal Cultures, pp. 117–140. Hart Publishing, Oxford (2001)

    Google Scholar 

  14. Holznagel, B., Werle, R.: Sectors and Strategies of Global Communication Regulation. Zeitschrift für Rechtsoziologie 23, 3–24 (2002)

    Google Scholar 

  15. Kilian, W.: Rekonzeptualisierung des Datenschutzrechts durch Technisierung und Selbstregulierung? In: Büllesbach, A., Steinkopf Druck, J.F. (eds.) Freundesgabe für, Stuttgart, pp. 151–160 (2001)

    Google Scholar 

  16. Leith, P.: Confidentiality, Privacy and E-Government: Clarifying the Notion of Public Space. In: Galindo, F., Traunmüller, R. (eds.) E-Government: Legal, Technical and Pedagogical Aspects, pp. 105–122. University of Zaragoza and IFIP, Zaragoza (2003)

    Google Scholar 

  17. Lessig, L.: Code and Other Laws of Cyberspace. Basic Books, New York (1999)

    Google Scholar 

  18. Lyon, D.: The Electronic Eye: The Rise of Surveillance Society. University of Minnesota Press, Minneapolis (1994)

    Google Scholar 

  19. Roßnagel, A., Pfitzmann, A., Garstka, H.: Modernisierung des Datenschutzrechts: Gutachten im Auftrag des Bundesministers des Innern (2002)

    Google Scholar 

  20. Schartum, D.W.: Privacy Enhancing Employment of ICT: Empowering and Assisting Data Subjects≫. International Review of Law, Computers and Technology 1(2), 157–170 (2001)

    Article  Google Scholar 

  21. Spanish E-commerce Association: Survey on B2B e-commerce (2003), at http://www.aece.org

  22. Teubner, G.: Substantive and Reflexive Elements in Modern Law. Law and Society Review 17(2), 239–285 (1983)

    Article  Google Scholar 

  23. Viseu, A., Clement, A., Aspinall, J.: Situating Privacy Online: Complex Perceptions and Everyday Practice. University of Toronto, Toronto (2003)

    Google Scholar 

  24. European Working Party on Data Protection, Working Document on Functioning of the Safe Harbor Agreement (2002)

    Google Scholar 

  25. European Working Party on Data Protection: Opinion 3/2003 on the European Code of conduct of FEDMA for the use of personal data in direct marketing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Oliver-Lalana, A.D. (2004). Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce Practices. In: Katsikas, S., Lopez, J., Pernul, G. (eds) Trust and Privacy in Digital Business. TrustBus 2004. Lecture Notes in Computer Science, vol 3184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30079-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30079-3_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22919-3

  • Online ISBN: 978-3-540-30079-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics