Advertisement

Journal of Business Ethics

, 62:221 | Cite as

A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent

  • Irene PollachEmail author
Article

Abstract

The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. The findings highlight that corporate privacy policies obfuscate, enhance and mitigate unethical data handling practices and use persuasive appeals to increase companies’ trustworthiness. The communicative strategies identified provide starting points for redesigning existing privacy statements with a view to communicating data handling practices in a more transparent and responsible manner, laying the groundwork for informed consent.

Key words

cookies critical linguistics data handling practices electronic commerce information privacy language privacy policies trust websites 

References

  1. Antón, A.,  et al. 2004‘The Lack of Clarity in Financial Privacy Policies and the Need for Standardization’IEEE Security and Privacy23645Google Scholar
  2. Beltramini, R. F. 2003‘Application of the Unfairness Doctrine to Marketing Communications on the Internet’Journal of Business Ethics42393400CrossRefGoogle Scholar
  3. Bennett, C. J. 2001‘Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web’Ethics and Information Technology3195210CrossRefGoogle Scholar
  4. Boutin, P.: 2002, ‘Just How Trusty Is TRUSTe?’, Wired, April 9, http://www.wired.com/news/exec/0,1370,51624,00.html
  5. Buchholz, R. A. 1995Business Environment and Public Policy Implications for Management5Prentice HallEnglewood CliffsGoogle Scholar
  6. Cannon, D. A. 2002‘The Ethics of Database Marketing’Information Management Journal364244Google Scholar
  7. Chen, K., Rea, A. I. 2004‘Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques’The Journal of Computer Information Systems448592Google Scholar
  8. De George, R. T. 2000‘Business Ethics and the Challenge of the Information Age’Business Ethics Quarterly106372Google Scholar
  9. Ebenkamp, B. 2002‘Brand Keys to Travel Sites: Straighten up and Fly Right’Brandweek4319Google Scholar
  10. Faden, R. R., Beauchamp, T.L. 1986A History and Theory of Informed ConsentOxford University PressNew YorkGoogle Scholar
  11. Fairclough, N. 1992Discourse and Social ChangePolity PressCambridgeGoogle Scholar
  12. Fairclough, N. 2001Language and Power2nd edition LongmanLondonGoogle Scholar
  13. Federal Trade Commission: 2000, Privacy Online: Fair Information Practices in the Electronic Marketplace. A Report to Congress, http://www.ftc.gov/reports/privacy2000/privacy 2000.pdf
  14. Forrester Research: US eCommerce – The Next Five Years, M2 Presswire, 29 August 2002Google Scholar
  15. Fowler, R., Kress, G.,  et al. 1979a‘Rules and Regulations’Fowler, R. eds. Language and ControlRoutledgeLondon2645Google Scholar
  16. Fowler, R., Kress, G.,  et al. 1979b‘Critical Linguistics’Fowler, R. eds. Language and ControlRoutledgeLondon185213Google Scholar
  17. Fowler, R. 1985‘Power’Dijk, T. eds. Handbook of Discourse AnalysisAcademic PressLondon6182Google Scholar
  18. Foxman, E. R., Kilcoyne, P. 1993‘Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues’Journal of Public Policy and Marketing12106119Google Scholar
  19. Fried, C. 1968‘Privacy’Yale Law Journal77475493Google Scholar
  20. Galański, D. 2000The Language of Deception. A Discourse Analytical StudySageThousand OaksGoogle Scholar
  21. Goodwin, C. 1991‘Privacy: Recognition of a Consumer Right’Journal of Public Policy and Marketing10149166Google Scholar
  22. Halliday, M. A. K. 1978Language as Social Semiotic: The Social Interpretation of Language and MeaningArnoldLondonGoogle Scholar
  23. Han, P., Maclaurin, A. 2002‘Do Consumers Really Care About Online Privacy?’Marketing Management113538Google Scholar
  24. Hodge, R., Kress, G. 1993Language as Ideology,2RoutledgeLondonGoogle Scholar
  25. Hoffman, D. L., Novak, T. P., Peralta, M. 1999‘Building Consumer Trust Online’Communications of the ACM428085CrossRefGoogle Scholar
  26. Hoffman, L. 1980Computers and Privacy in the Next DecadeAcademic PressNew YorkGoogle Scholar
  27. Ide, N., Véronis, J. 1998‘Word Sense Disambiguation: The State of the Art’Computational Linguistics24140Google Scholar
  28. Introna, L. D., Pouloudi, A. 1999‘Privacy in the Information Age: Stakeholders, Interests and Values’Journal of Business Ethics222738CrossRefGoogle Scholar
  29. Jones, S., Wilikens, M., Morris, P., Masera, M. 2000‘Trust Requirements in E-Business’Communications of the ACM438087CrossRefGoogle Scholar
  30. Jordan, M. P. 1998‘The Power of Negation in English: Text, Context and Relevance’Journal of Pragmatics29705752CrossRefGoogle Scholar
  31. Jucker, A. H., Smith, S. W., Lüdge, T. 2003‘Interactive Aspects of Vagueness in Conversation’Journal of Pragmatics3517371769CrossRefGoogle Scholar
  32. Kelly, E. P., Rowland, H. C. 2000‘Ethical and Online Privacy Issues in Electronic Commerce’Business Horizons43312CrossRefGoogle Scholar
  33. Koehn, D. 2003‘The Nature of and Conditions for Online Trust’Journal of Business Ethics43319Google Scholar
  34. Kreidler, C. W. 1998Introducing English SemanticsRoutledgeLondonGoogle Scholar
  35. Kress, G. 1985‘Ideological Structures in Discourse’Dijk, T. eds. Handbook of Discourse AnalysisAcademic PressLondon2742Google Scholar
  36. Liu, C., Arnett, K. P. 2002‘Raising a Red Flag on Global WWW Privacy Policies’The Journal of Computer Information Systems43117127Google Scholar
  37. Liu, C., Marchewka, J. T., Lu, J., Yu, C.-S. 2004‘Beyond Concern: A Privacy-Trust-Behavioral Intention Model of Electronic Commerce’Information and Management42127142Google Scholar
  38. Mascarenhas, O. A. J., Kesavan, R., Bernacchi, M. D. 2003‘Co-Managing Online Privacy: A Call for Joint Ownership’Journal of Consumer Marketing20686702CrossRefGoogle Scholar
  39. Mason, R. O. 1995‘Applying Ethics to Information Technology Issues’Communications of the ACM385557CrossRefGoogle Scholar
  40. Mason, R. O., Mason, F. M., Culnan, M. J. 1995Ethics of Information ManagementSageThousand OaksGoogle Scholar
  41. McCabe, A. 1998‘Sentences Combined: Text and Discourse’Gleason, J. B.Ratner, N. B. eds. Psycholinguistics 2Harcourt BraceFort Worth, TX275308Google Scholar
  42. McCullagh, D.: 1999, Is TRUSTe Trustworthy?, Wired, November 5, http://www.wired.com/news/politics/0,1283,32329,00.html
  43. McEnery, T., Wilson, A. 2001Corpus Linguistics2Edinburgh University PressEdinburghGoogle Scholar
  44. Metzger, M.: 2004, ‘Privacy, Trust and Disclosure: Exploring Barriers to Electronic Commerce’, Journal of Computer-Mediated Communication 9(4), http://www. ascusc.org/jcmc/vol9/issue4/metzger.html
  45. Metzger, M. J., Docter, S. 2003‘Public Opinion and Policy Initiatives for Online Privacy Protection’Journal of Broadcasting and Electronic Media47350374Google Scholar
  46. Milne, G. R., Culnan, M. J. 2004‘Strategies for Reducing Online Privacy Risks: Why Consumers Read (Or Dont Read) Online Privacy Notices’Journal of Interactive Marketing181529CrossRefGoogle Scholar
  47. Miyazaki, A. D., Fernandez, A. 2000‘Internet Privacy and Security: An Examination of Online Retailer Disclosures’Journal of Public Policy and Marketing195461Google Scholar
  48. Nyshadham, E. A. 2000‘Privacy Policies of Air Travel Web Sites: A Survey and Analysis’Journal of Air Transport Management6143152Google Scholar
  49. Olivero, N., Lunt, P. 2004‘Privacy versus Willingness to Disclose in E-Commerce Exchanges: The Effect of Risk Awareness on the Relative Role of Trust and Control’Journal of Economic Psychology25243262CrossRefGoogle Scholar
  50. Oz, E. 2004‘Ethical Issues’George, J. F. eds. Computers in Society. Privacy, Ethics, and the InternetPearsonUpper Saddle River284295Google Scholar
  51. Palmer, J. W., J. P. Bailey and S. Faraj: 2000, ‘The Role of Intermediaries in the Development of Trust on the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements’, Journal of Computer-Mediated Communication 5(3), http://www.ascusc.org/jcmc/vol5/issue3/palmer.html
  52. Phelps, J., Nowak, G., Ferrell, E. 2000‘Privacy Concerns and Consumer Willingness to Provide Personal Information’Journal of Public Policy and Marketing192741Google Scholar
  53. Pollach, I. 2004‘Online Privacy Statements – Are They Worth Reading?’Khosrow-Pour, M. eds. Innovations Through Information TechnologyIdea PublishingHershey217220Google Scholar
  54. Popping, R. 2000Computer-Assisted Text AnalysisSageLondonGoogle Scholar
  55. Prosser, W. 1960‘Privacy’California Law Review48383423Google Scholar
  56. Rachels, J. 1975‘Why Privacy is Important’Philosophy and Public Affairs4323333Google Scholar
  57. Reda, S.: 2000, ‘VeriFone and Russel Reynolds Associates Top 100 Internet Retailers’, Stores, https://www.stores.org/archives/00top100int_1.aspGoogle Scholar
  58. Rennhard, M.,  et al. 2004‘Towards Pseudonymous E-Commerce’Electronic Commerce Research483111Google Scholar
  59. Riley, K. 1993‘Telling More than the Truth: Implicature, Speech Acts, and Ethics in Professional Communication’Journal of Business Ethics12179196CrossRefGoogle Scholar
  60. Ryker, R.,  et al. 2002‘Online Privacy Policies: An Assessment of the Fortune E-50’The Journal of Computer Information Systems421520Google Scholar
  61. Saban, K. A., McGivern, E., Saykiewicz, J. N. 2002‘A Critical Look at the Impact of Cybercrime on Consumer Internet Behavior’Journal of Marketing Theory and Practice102937Google Scholar
  62. Sakkis, G.,  et al. 2003‘A Memory-Based Approach to Anti-Spam Filtering for Mailing Lists’Information Retrieval64973CrossRefGoogle Scholar
  63. Samoriski, J. H. 1999‘Unsolicited Commercial E-Mail, the Internet and the First Amendment: Another Free Speech Showdown in Cyberspace?’Journal of Broadcasting and Electronic Media43670689Google Scholar
  64. Schrøder, K. C. 2002‘Discourses of Fact’Jensen, K. B. eds. A Handbook of Media and Communication ResearchRoutledgeLondon98116Google Scholar
  65. Schwartz, J.: 2001, Seeking Privacy Online, Even as Security Tightens, New York Times, November 11, 3.10Google Scholar
  66. Shapiro, B., Baker, C. R. 2001‘Information Technology and the Social Construction of Information Privacy’Journal of Accounting and Public Policy20295322Google Scholar
  67. Smith, A. D., Rupp, W. T. 2004‘Online Privacy Policies and Diffusion Theory Perspectives: Security or Chaos?’Services Marketing Quarterly255375CrossRefGoogle Scholar
  68. Stahl, B. C. 2004‘Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics?’Journal of Organizational and End User Computing165977Google Scholar
  69. Stead, B. A., Gilbert, J. 2001‘Ethical Issues in Electronic Commerce’Journal of Business Ethics347585CrossRefGoogle Scholar
  70. Stiff, J. B. 1994Persuasive CommunicationGuilfordNew YorkGoogle Scholar
  71. Stubbs, M. 1996Text and Corpus Analysis. Computer-Assisted Studies of Language and CultureBlackwellOxfordGoogle Scholar
  72. Van Dijk, T. A. 1997‘Discourse as Interaction in Society’Dijk , T. A. eds. Discourse as Social InteractionSageLondon137Google Scholar
  73. Wel, L., Royakkers, L. 2004‘Ethical Issues in Web Data Mining’Ethics and Information Technology6129140Google Scholar
  74. Velasquez, M. G. 2002Business Ethics. Concepts and Cases5Prentice HallUpper Saddle RiverGoogle Scholar
  75. Warren, S., Brandeis, L. 1890‘The Right of Privacy’Harvard Law Review4193220Google Scholar
  76. Wason, P. C. 1965‘The Contexts of Plausible Denial’Journal of Verbal Learning and Verbal Behavior4711CrossRefGoogle Scholar
  77. Weber, L. R., Carter, A. 1998‘On Constructing Trust: Temporality, Self-Disclosure, and Perspective-Taking’The International Journal of Sociology and Social Policy18726CrossRefGoogle Scholar
  78. Westin, A. F. 1967Privacy and FreedomAtheneumNew YorkGoogle Scholar
  79. Zhang, Q. 1998‘Fuzziness – Vagueness – Generality – Ambiguity’Journal of Pragmatics291331CrossRefGoogle Scholar

Copyright information

© Springer 2005

Authors and Affiliations

  1. 1.Department of English Business CommunicationVienna University of Economics and Business AdministrationViennaAustria

Personalised recommendations