Skip to main content
Log in

A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. The findings highlight that corporate privacy policies obfuscate, enhance and mitigate unethical data handling practices and use persuasive appeals to increase companies’ trustworthiness. The communicative strategies identified provide starting points for redesigning existing privacy statements with a view to communicating data handling practices in a more transparent and responsible manner, laying the groundwork for informed consent.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • A. Antón et al. (2004) ArticleTitle‘The Lack of Clarity in Financial Privacy Policies and the Need for Standardization’ IEEE Security and Privacy 2 IssueID2 36–45

    Google Scholar 

  • R. F. Beltramini (2003) ArticleTitle‘Application of the Unfairness Doctrine to Marketing Communications on the Internet’ Journal of Business Ethics 42 IssueID4 393–400 Occurrence Handle10.1023/A:1022521811932

    Article  Google Scholar 

  • C. J. Bennett (2001) ArticleTitle‘Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web’ Ethics and Information Technology 3 IssueID3 195–210 Occurrence Handle10.1023/A:1012235815384

    Article  Google Scholar 

  • Boutin, P.: 2002, ‘Just How Trusty Is TRUSTe?’, Wired, April 9, http://www.wired.com/news/exec/0,1370,51624,00.html

  • R. A. Buchholz (1995) Business Environment and Public Policy Implications for Management EditionNumber5 Prentice Hall Englewood Cliffs

    Google Scholar 

  • D. A. Cannon (2002) ArticleTitle‘The Ethics of Database Marketing’ Information Management Journal 36 IssueID3 42–44

    Google Scholar 

  • K. Chen A. I. Rea (2004) ArticleTitle‘Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques’ The Journal of Computer Information Systems 44 IssueID4 85–92

    Google Scholar 

  • R. T. De George (2000) ArticleTitle‘Business Ethics and the Challenge of the Information Age’ Business Ethics Quarterly 10 IssueID1 63–72

    Google Scholar 

  • B. Ebenkamp (2002) ArticleTitle‘Brand Keys to Travel Sites: Straighten up and Fly Right’ Brandweek 43 IssueID25 19

    Google Scholar 

  • R. R. Faden T.L. Beauchamp (1986) A History and Theory of Informed Consent Oxford University Press New York

    Google Scholar 

  • N. Fairclough (1992) Discourse and Social Change Polity Press Cambridge

    Google Scholar 

  • N. Fairclough (2001) Language and Power EditionNumber2nd edition Longman London

    Google Scholar 

  • Federal Trade Commission: 2000, Privacy Online: Fair Information Practices in the Electronic Marketplace. A Report to Congress, http://www.ftc.gov/reports/privacy2000/privacy 2000.pdf

  • Forrester Research: US eCommerce – The Next Five Years, M2 Presswire, 29 August 2002

  • R. Fowler G. Kress (1979a) ‘Rules and Regulations’ R. Fowler (Eds) et al. Language and Control Routledge London 26–45

    Google Scholar 

  • R. Fowler G. Kress (1979b) ‘Critical Linguistics’ R. Fowler (Eds) et al. Language and Control Routledge London 185–213

    Google Scholar 

  • R. Fowler (1985) ‘Power’ T. Dijk Particlevan (Eds) Handbook of Discourse Analysis NumberInSeries4 Academic Press London 61–82

    Google Scholar 

  • E. R. Foxman P. Kilcoyne (1993) ArticleTitle‘Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues’ Journal of Public Policy and Marketing 12 IssueID1 106–119

    Google Scholar 

  • C. Fried (1968) ArticleTitle‘Privacy’ Yale Law Journal 77 475–493

    Google Scholar 

  • D. Galański (2000) The Language of Deception. A Discourse Analytical Study Sage Thousand Oaks

    Google Scholar 

  • C. Goodwin (1991) ArticleTitle‘Privacy: Recognition of a Consumer Right’ Journal of Public Policy and Marketing 10 IssueID1 149–166

    Google Scholar 

  • M. A. K. Halliday (1978) Language as Social Semiotic: The Social Interpretation of Language and Meaning Arnold London

    Google Scholar 

  • P. Han A. Maclaurin (2002) ArticleTitle‘Do Consumers Really Care About Online Privacy?’ Marketing Management 11 IssueID1 35–38

    Google Scholar 

  • R. Hodge G. Kress (1993) Language as Ideology, EditionNumber2 Routledge London

    Google Scholar 

  • D. L. Hoffman T. P. Novak M. Peralta (1999) ArticleTitle‘Building Consumer Trust Online’ Communications of the ACM 42 IssueID4 80–85 Occurrence Handle10.1145/299157.299175

    Article  Google Scholar 

  • L. Hoffman (1980) Computers and Privacy in the Next Decade Academic Press New York

    Google Scholar 

  • N. Ide J. Véronis (1998) ArticleTitle‘Word Sense Disambiguation: The State of the Art’ Computational Linguistics 24 IssueID1 1–40

    Google Scholar 

  • L. D. Introna A. Pouloudi (1999) ArticleTitle‘Privacy in the Information Age: Stakeholders, Interests and Values’ Journal of Business Ethics 22 IssueID1 27–38 Occurrence Handle10.1023/A:1006151900807

    Article  Google Scholar 

  • S. Jones M. Wilikens P. Morris M. Masera (2000) ArticleTitle‘Trust Requirements in E-Business’ Communications of the ACM 43 IssueID12 80–87 Occurrence Handle10.1145/355112.355128

    Article  Google Scholar 

  • M. P. Jordan (1998) ArticleTitle‘The Power of Negation in English: Text, Context and Relevance’ Journal of Pragmatics 29 IssueID6 705–752 Occurrence Handle10.1016/S0378-2166(97)00086-6

    Article  Google Scholar 

  • A. H. Jucker S. W. Smith T. Lüdge (2003) ArticleTitle‘Interactive Aspects of Vagueness in Conversation’ Journal of Pragmatics 35 IssueID12 1737–1769 Occurrence Handle10.1016/S0378-2166(02)00188-1

    Article  Google Scholar 

  • E. P. Kelly H. C. Rowland (2000) ArticleTitle‘Ethical and Online Privacy Issues in Electronic Commerce’ Business Horizons 43 IssueID3 3–12 Occurrence Handle10.1016/S0007-6813(00)89195-8

    Article  Google Scholar 

  • D. Koehn (2003) ArticleTitle‘The Nature of and Conditions for Online Trust’ Journal of Business Ethics 43 IssueID1–2 3–19

    Google Scholar 

  • C. W. Kreidler (1998) Introducing English Semantics Routledge London

    Google Scholar 

  • G. Kress (1985) ‘Ideological Structures in Discourse’ T. Dijk Particlevan (Eds) Handbook of Discourse Analysis NumberInSeriesvol 4 Academic Press London 27–42

    Google Scholar 

  • C. Liu K. P. Arnett (2002) ArticleTitle‘Raising a Red Flag on Global WWW Privacy Policies’ The Journal of Computer Information Systems 43 IssueID1 117–127

    Google Scholar 

  • C. Liu J. T. Marchewka J. Lu C.-S. Yu (2004) ArticleTitle‘Beyond Concern: A Privacy-Trust-Behavioral Intention Model of Electronic Commerce’ Information and Management 42 IssueID1 127–142

    Google Scholar 

  • O. A. J. Mascarenhas R. Kesavan M. D. Bernacchi (2003) ArticleTitle‘Co-Managing Online Privacy: A Call for Joint Ownership’ Journal of Consumer Marketing 20 IssueID7 686–702 Occurrence Handle10.1108/07363760310506201

    Article  Google Scholar 

  • R. O. Mason (1995) ArticleTitle‘Applying Ethics to Information Technology Issues’ Communications of the ACM 38 IssueID12 55–57 Occurrence Handle10.1145/219663.219681

    Article  Google Scholar 

  • R. O. Mason F. M. Mason M. J. Culnan (1995) Ethics of Information Management Sage Thousand Oaks

    Google Scholar 

  • A. McCabe (1998) ‘Sentences Combined: Text and Discourse’ J. B. Gleason N. B. Ratner (Eds) Psycholinguistics EditionNumber2 Harcourt Brace Fort Worth, TX 275–308

    Google Scholar 

  • McCullagh, D.: 1999, Is TRUSTe Trustworthy?, Wired, November 5, http://www.wired.com/news/politics/0,1283,32329,00.html

  • T. McEnery A. Wilson (2001) Corpus Linguistics EditionNumber2 Edinburgh University Press Edinburgh

    Google Scholar 

  • Metzger, M.: 2004, ‘Privacy, Trust and Disclosure: Exploring Barriers to Electronic Commerce’, Journal of Computer-Mediated Communication 9(4), http://www. ascusc.org/jcmc/vol9/issue4/metzger.html

  • M. J. Metzger S. Docter (2003) ArticleTitle‘Public Opinion and Policy Initiatives for Online Privacy Protection’ Journal of Broadcasting and Electronic Media 47 IssueID3 350–374

    Google Scholar 

  • G. R. Milne M. J. Culnan (2004) ArticleTitle‘Strategies for Reducing Online Privacy Risks: Why Consumers Read (Or Dont Read) Online Privacy Notices’ Journal of Interactive Marketing 18 IssueID3 15–29 Occurrence Handle10.1002/dir.20009

    Article  Google Scholar 

  • A. D. Miyazaki A. Fernandez (2000) ArticleTitle‘Internet Privacy and Security: An Examination of Online Retailer Disclosures’ Journal of Public Policy and Marketing 19 IssueID1 54–61

    Google Scholar 

  • E. A. Nyshadham (2000) ArticleTitle‘Privacy Policies of Air Travel Web Sites: A Survey and Analysis’ Journal of Air Transport Management 6 IssueID2 143–152

    Google Scholar 

  • N. Olivero P. Lunt (2004) ArticleTitle‘Privacy versus Willingness to Disclose in E-Commerce Exchanges: The Effect of Risk Awareness on the Relative Role of Trust and Control’ Journal of Economic Psychology 25 IssueID2 243–262 Occurrence Handle10.1016/S0167-4870(02)00172-1

    Article  Google Scholar 

  • E. Oz (2004) ‘Ethical Issues’ J. F. George (Eds) Computers in Society. Privacy, Ethics, and the Internet Pearson Upper Saddle River 284–295

    Google Scholar 

  • Palmer, J. W., J. P. Bailey and S. Faraj: 2000, ‘The Role of Intermediaries in the Development of Trust on the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements’, Journal of Computer-Mediated Communication 5(3), http://www.ascusc.org/jcmc/vol5/issue3/palmer.html

  • J. Phelps G. Nowak E. Ferrell (2000) ArticleTitle‘Privacy Concerns and Consumer Willingness to Provide Personal Information’ Journal of Public Policy and Marketing 19 IssueID1 27–41

    Google Scholar 

  • I. Pollach (2004) ‘Online Privacy Statements – Are They Worth Reading?’ M. Khosrow-Pour (Eds) Innovations Through Information Technology Idea Publishing Hershey 217–220

    Google Scholar 

  • R. Popping (2000) Computer-Assisted Text Analysis Sage London

    Google Scholar 

  • W. Prosser (1960) ArticleTitle‘Privacy’ California Law Review 48 IssueID3 383–423

    Google Scholar 

  • J. Rachels (1975) ArticleTitle‘Why Privacy is Important’ Philosophy and Public Affairs 4 IssueID4 323–333

    Google Scholar 

  • Reda, S.: 2000, ‘VeriFone and Russel Reynolds Associates Top 100 Internet Retailers’, Stores, https://www.stores.org/archives/00top100int_1.asp

  • M. Rennhard et al. (2004) ArticleTitle‘Towards Pseudonymous E-Commerce’ Electronic Commerce Research 4 IssueID1–2 83–111

    Google Scholar 

  • K. Riley (1993) ArticleTitle‘Telling More than the Truth: Implicature, Speech Acts, and Ethics in Professional Communication’ Journal of Business Ethics 12 IssueID3 179–196 Occurrence Handle10.1007/BF01686446

    Article  Google Scholar 

  • R. Ryker et al. (2002) ArticleTitle‘Online Privacy Policies: An Assessment of the Fortune E-50’ The Journal of Computer Information Systems 42 IssueID4 15–20

    Google Scholar 

  • K. A. Saban E. McGivern J. N. Saykiewicz (2002) ArticleTitle‘A Critical Look at the Impact of Cybercrime on Consumer Internet Behavior’ Journal of Marketing Theory and Practice 10 IssueID2 29–37

    Google Scholar 

  • G. Sakkis et al. (2003) ArticleTitle‘A Memory-Based Approach to Anti-Spam Filtering for Mailing Lists’ Information Retrieval 6 IssueID1 49–73 Occurrence Handle10.1023/A:1022948414856

    Article  Google Scholar 

  • J. H. Samoriski (1999) ArticleTitle‘Unsolicited Commercial E-Mail, the Internet and the First Amendment: Another Free Speech Showdown in Cyberspace?’ Journal of Broadcasting and Electronic Media 43 IssueID4 670–689

    Google Scholar 

  • K. C. Schrøder (2002) ‘Discourses of Fact’ K. B. Jensen (Eds) A Handbook of Media and Communication Research Routledge London 98–116

    Google Scholar 

  • Schwartz, J.: 2001, Seeking Privacy Online, Even as Security Tightens, New York Times, November 11, 3.10

  • B. Shapiro C. R. Baker (2001) ArticleTitle‘Information Technology and the Social Construction of Information Privacy’ Journal of Accounting and Public Policy 20 IssueID4–5 295–322

    Google Scholar 

  • A. D. Smith W. T. Rupp (2004) ArticleTitle‘Online Privacy Policies and Diffusion Theory Perspectives: Security or Chaos?’ Services Marketing Quarterly 25 IssueID3 53–75 Occurrence Handle10.1300/J396v25n03_04

    Article  Google Scholar 

  • B. C. Stahl (2004) ArticleTitle‘Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics?’ Journal of Organizational and End User Computing 16 IssueID3 59–77

    Google Scholar 

  • B. A. Stead J. Gilbert (2001) ArticleTitle‘Ethical Issues in Electronic Commerce’ Journal of Business Ethics 34 IssueID2 75–85 Occurrence Handle10.1023/A:1012266020988

    Article  Google Scholar 

  • J. B. Stiff (1994) Persuasive Communication Guilford New York

    Google Scholar 

  • M. Stubbs (1996) Text and Corpus Analysis. Computer-Assisted Studies of Language and Culture Blackwell Oxford

    Google Scholar 

  • T. A. Van Dijk (1997) ‘Discourse as Interaction in Society’ T. A. Dijk ParticleVan (Eds) Discourse as Social Interaction NumberInSeriesvol 2 Sage London 1–37

    Google Scholar 

  • L. Wel ParticleVan L. Royakkers (2004) ArticleTitle‘Ethical Issues in Web Data Mining’ Ethics and Information Technology 6 IssueID2 129–140

    Google Scholar 

  • M. G. Velasquez (2002) Business Ethics. Concepts and Cases EditionNumber5 Prentice Hall Upper Saddle River

    Google Scholar 

  • S. Warren L. Brandeis (1890) ArticleTitle‘The Right of Privacy’ Harvard Law Review 4 IssueID5 193–220

    Google Scholar 

  • P. C. Wason (1965) ArticleTitle‘The Contexts of Plausible Denial’ Journal of Verbal Learning and Verbal Behavior 4 7–11 Occurrence Handle10.1016/S0022-5371(65)80060-3

    Article  Google Scholar 

  • L. R. Weber A. Carter (1998) ArticleTitle‘On Constructing Trust: Temporality, Self-Disclosure, and Perspective-Taking’ The International Journal of Sociology and Social Policy 18 IssueID1 7–26 Occurrence Handle10.1108/01443339810788290

    Article  Google Scholar 

  • A. F. Westin (1967) Privacy and Freedom Atheneum New York

    Google Scholar 

  • Q. Zhang (1998) ArticleTitle‘Fuzziness – Vagueness – Generality – Ambiguity’ Journal of Pragmatics 29 IssueID1 13–31 Occurrence Handle10.1016/S0378-2166(97)00014-3

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Irene Pollach.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Pollach, I. A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent. J Bus Ethics 62, 221–235 (2005). https://doi.org/10.1007/s10551-005-7898-3

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-005-7898-3

Key words

Navigation