Reference Hub16
Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business

Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business

George Yee, Larry Korba
Copyright: © 2005 |Volume: 1 |Issue: 1 |Pages: 16
ISSN: 1548-1131|EISSN: 1548-114X|ISSN: 1548-1131|EISBN13: 9781615205660|EISSN: 1548-114X|DOI: 10.4018/jebr.2005010104
Cite Article Cite Article

MLA

Yee, George, and Larry Korba. "Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business." IJEBR vol.1, no.1 2005: pp.54-69. http://doi.org/10.4018/jebr.2005010104

APA

Yee, G. & Korba, L. (2005). Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business. International Journal of E-Business Research (IJEBR), 1(1), 54-69. http://doi.org/10.4018/jebr.2005010104

Chicago

Yee, George, and Larry Korba. "Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business," International Journal of E-Business Research (IJEBR) 1, no.1: 54-69. http://doi.org/10.4018/jebr.2005010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The growth of the Internet has been accompanied by the growth of Internet e-business services (e.g., electronic bookseller services, electronic stock-transaction services). This proliferation of e-business services has in turn fueled the need to protect the personal privacy of e-business users or consumers. We advocate a privacy policy approach to protecting personal privacy. However, it is evident that the specification of a personal privacy policy must be as easy as possible for the consumer. In this paper, we define the content of personal privacy policies using privacy principles that have been enacted into legislation. We then present two semiautomated approaches for the derivation of personal privacy policies. The first approach makes use of common privacy rules obtained through community consensus. This consensus can be obtained from research and/or surveys. The second approach makes use of existing privacy policies in a peer-to-peer community. We conclude the paper by explaining how personal privacy policies can be applied in e-business to protect consumer privacy.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.