Abstract
The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. The findings highlight that corporate privacy policies obfuscate, enhance and mitigate unethical data handling practices and use persuasive appeals to increase companies’ trustworthiness. The communicative strategies identified provide starting points for redesigning existing privacy statements with a view to communicating data handling practices in a more transparent and responsible manner, laying the groundwork for informed consent.
Similar content being viewed by others
References
A. Antón et al. (2004) ArticleTitle‘The Lack of Clarity in Financial Privacy Policies and the Need for Standardization’ IEEE Security and Privacy 2 IssueID2 36–45
R. F. Beltramini (2003) ArticleTitle‘Application of the Unfairness Doctrine to Marketing Communications on the Internet’ Journal of Business Ethics 42 IssueID4 393–400 Occurrence Handle10.1023/A:1022521811932
C. J. Bennett (2001) ArticleTitle‘Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web’ Ethics and Information Technology 3 IssueID3 195–210 Occurrence Handle10.1023/A:1012235815384
Boutin, P.: 2002, ‘Just How Trusty Is TRUSTe?’, Wired, April 9, http://www.wired.com/news/exec/0,1370,51624,00.html
R. A. Buchholz (1995) Business Environment and Public Policy Implications for Management EditionNumber5 Prentice Hall Englewood Cliffs
D. A. Cannon (2002) ArticleTitle‘The Ethics of Database Marketing’ Information Management Journal 36 IssueID3 42–44
K. Chen A. I. Rea (2004) ArticleTitle‘Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques’ The Journal of Computer Information Systems 44 IssueID4 85–92
R. T. De George (2000) ArticleTitle‘Business Ethics and the Challenge of the Information Age’ Business Ethics Quarterly 10 IssueID1 63–72
B. Ebenkamp (2002) ArticleTitle‘Brand Keys to Travel Sites: Straighten up and Fly Right’ Brandweek 43 IssueID25 19
R. R. Faden T.L. Beauchamp (1986) A History and Theory of Informed Consent Oxford University Press New York
N. Fairclough (1992) Discourse and Social Change Polity Press Cambridge
N. Fairclough (2001) Language and Power EditionNumber2nd edition Longman London
Federal Trade Commission: 2000, Privacy Online: Fair Information Practices in the Electronic Marketplace. A Report to Congress, http://www.ftc.gov/reports/privacy2000/privacy 2000.pdf
Forrester Research: US eCommerce – The Next Five Years, M2 Presswire, 29 August 2002
R. Fowler G. Kress (1979a) ‘Rules and Regulations’ R. Fowler (Eds) et al. Language and Control Routledge London 26–45
R. Fowler G. Kress (1979b) ‘Critical Linguistics’ R. Fowler (Eds) et al. Language and Control Routledge London 185–213
R. Fowler (1985) ‘Power’ T. Dijk Particlevan (Eds) Handbook of Discourse Analysis NumberInSeries4 Academic Press London 61–82
E. R. Foxman P. Kilcoyne (1993) ArticleTitle‘Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues’ Journal of Public Policy and Marketing 12 IssueID1 106–119
C. Fried (1968) ArticleTitle‘Privacy’ Yale Law Journal 77 475–493
D. Galański (2000) The Language of Deception. A Discourse Analytical Study Sage Thousand Oaks
C. Goodwin (1991) ArticleTitle‘Privacy: Recognition of a Consumer Right’ Journal of Public Policy and Marketing 10 IssueID1 149–166
M. A. K. Halliday (1978) Language as Social Semiotic: The Social Interpretation of Language and Meaning Arnold London
P. Han A. Maclaurin (2002) ArticleTitle‘Do Consumers Really Care About Online Privacy?’ Marketing Management 11 IssueID1 35–38
R. Hodge G. Kress (1993) Language as Ideology, EditionNumber2 Routledge London
D. L. Hoffman T. P. Novak M. Peralta (1999) ArticleTitle‘Building Consumer Trust Online’ Communications of the ACM 42 IssueID4 80–85 Occurrence Handle10.1145/299157.299175
L. Hoffman (1980) Computers and Privacy in the Next Decade Academic Press New York
N. Ide J. Véronis (1998) ArticleTitle‘Word Sense Disambiguation: The State of the Art’ Computational Linguistics 24 IssueID1 1–40
L. D. Introna A. Pouloudi (1999) ArticleTitle‘Privacy in the Information Age: Stakeholders, Interests and Values’ Journal of Business Ethics 22 IssueID1 27–38 Occurrence Handle10.1023/A:1006151900807
S. Jones M. Wilikens P. Morris M. Masera (2000) ArticleTitle‘Trust Requirements in E-Business’ Communications of the ACM 43 IssueID12 80–87 Occurrence Handle10.1145/355112.355128
M. P. Jordan (1998) ArticleTitle‘The Power of Negation in English: Text, Context and Relevance’ Journal of Pragmatics 29 IssueID6 705–752 Occurrence Handle10.1016/S0378-2166(97)00086-6
A. H. Jucker S. W. Smith T. Lüdge (2003) ArticleTitle‘Interactive Aspects of Vagueness in Conversation’ Journal of Pragmatics 35 IssueID12 1737–1769 Occurrence Handle10.1016/S0378-2166(02)00188-1
E. P. Kelly H. C. Rowland (2000) ArticleTitle‘Ethical and Online Privacy Issues in Electronic Commerce’ Business Horizons 43 IssueID3 3–12 Occurrence Handle10.1016/S0007-6813(00)89195-8
D. Koehn (2003) ArticleTitle‘The Nature of and Conditions for Online Trust’ Journal of Business Ethics 43 IssueID1–2 3–19
C. W. Kreidler (1998) Introducing English Semantics Routledge London
G. Kress (1985) ‘Ideological Structures in Discourse’ T. Dijk Particlevan (Eds) Handbook of Discourse Analysis NumberInSeriesvol 4 Academic Press London 27–42
C. Liu K. P. Arnett (2002) ArticleTitle‘Raising a Red Flag on Global WWW Privacy Policies’ The Journal of Computer Information Systems 43 IssueID1 117–127
C. Liu J. T. Marchewka J. Lu C.-S. Yu (2004) ArticleTitle‘Beyond Concern: A Privacy-Trust-Behavioral Intention Model of Electronic Commerce’ Information and Management 42 IssueID1 127–142
O. A. J. Mascarenhas R. Kesavan M. D. Bernacchi (2003) ArticleTitle‘Co-Managing Online Privacy: A Call for Joint Ownership’ Journal of Consumer Marketing 20 IssueID7 686–702 Occurrence Handle10.1108/07363760310506201
R. O. Mason (1995) ArticleTitle‘Applying Ethics to Information Technology Issues’ Communications of the ACM 38 IssueID12 55–57 Occurrence Handle10.1145/219663.219681
R. O. Mason F. M. Mason M. J. Culnan (1995) Ethics of Information Management Sage Thousand Oaks
A. McCabe (1998) ‘Sentences Combined: Text and Discourse’ J. B. Gleason N. B. Ratner (Eds) Psycholinguistics EditionNumber2 Harcourt Brace Fort Worth, TX 275–308
McCullagh, D.: 1999, Is TRUSTe Trustworthy?, Wired, November 5, http://www.wired.com/news/politics/0,1283,32329,00.html
T. McEnery A. Wilson (2001) Corpus Linguistics EditionNumber2 Edinburgh University Press Edinburgh
Metzger, M.: 2004, ‘Privacy, Trust and Disclosure: Exploring Barriers to Electronic Commerce’, Journal of Computer-Mediated Communication 9(4), http://www. ascusc.org/jcmc/vol9/issue4/metzger.html
M. J. Metzger S. Docter (2003) ArticleTitle‘Public Opinion and Policy Initiatives for Online Privacy Protection’ Journal of Broadcasting and Electronic Media 47 IssueID3 350–374
G. R. Milne M. J. Culnan (2004) ArticleTitle‘Strategies for Reducing Online Privacy Risks: Why Consumers Read (Or Dont Read) Online Privacy Notices’ Journal of Interactive Marketing 18 IssueID3 15–29 Occurrence Handle10.1002/dir.20009
A. D. Miyazaki A. Fernandez (2000) ArticleTitle‘Internet Privacy and Security: An Examination of Online Retailer Disclosures’ Journal of Public Policy and Marketing 19 IssueID1 54–61
E. A. Nyshadham (2000) ArticleTitle‘Privacy Policies of Air Travel Web Sites: A Survey and Analysis’ Journal of Air Transport Management 6 IssueID2 143–152
N. Olivero P. Lunt (2004) ArticleTitle‘Privacy versus Willingness to Disclose in E-Commerce Exchanges: The Effect of Risk Awareness on the Relative Role of Trust and Control’ Journal of Economic Psychology 25 IssueID2 243–262 Occurrence Handle10.1016/S0167-4870(02)00172-1
E. Oz (2004) ‘Ethical Issues’ J. F. George (Eds) Computers in Society. Privacy, Ethics, and the Internet Pearson Upper Saddle River 284–295
Palmer, J. W., J. P. Bailey and S. Faraj: 2000, ‘The Role of Intermediaries in the Development of Trust on the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements’, Journal of Computer-Mediated Communication 5(3), http://www.ascusc.org/jcmc/vol5/issue3/palmer.html
J. Phelps G. Nowak E. Ferrell (2000) ArticleTitle‘Privacy Concerns and Consumer Willingness to Provide Personal Information’ Journal of Public Policy and Marketing 19 IssueID1 27–41
I. Pollach (2004) ‘Online Privacy Statements – Are They Worth Reading?’ M. Khosrow-Pour (Eds) Innovations Through Information Technology Idea Publishing Hershey 217–220
R. Popping (2000) Computer-Assisted Text Analysis Sage London
W. Prosser (1960) ArticleTitle‘Privacy’ California Law Review 48 IssueID3 383–423
J. Rachels (1975) ArticleTitle‘Why Privacy is Important’ Philosophy and Public Affairs 4 IssueID4 323–333
Reda, S.: 2000, ‘VeriFone and Russel Reynolds Associates Top 100 Internet Retailers’, Stores, https://www.stores.org/archives/00top100int_1.asp
M. Rennhard et al. (2004) ArticleTitle‘Towards Pseudonymous E-Commerce’ Electronic Commerce Research 4 IssueID1–2 83–111
K. Riley (1993) ArticleTitle‘Telling More than the Truth: Implicature, Speech Acts, and Ethics in Professional Communication’ Journal of Business Ethics 12 IssueID3 179–196 Occurrence Handle10.1007/BF01686446
R. Ryker et al. (2002) ArticleTitle‘Online Privacy Policies: An Assessment of the Fortune E-50’ The Journal of Computer Information Systems 42 IssueID4 15–20
K. A. Saban E. McGivern J. N. Saykiewicz (2002) ArticleTitle‘A Critical Look at the Impact of Cybercrime on Consumer Internet Behavior’ Journal of Marketing Theory and Practice 10 IssueID2 29–37
G. Sakkis et al. (2003) ArticleTitle‘A Memory-Based Approach to Anti-Spam Filtering for Mailing Lists’ Information Retrieval 6 IssueID1 49–73 Occurrence Handle10.1023/A:1022948414856
J. H. Samoriski (1999) ArticleTitle‘Unsolicited Commercial E-Mail, the Internet and the First Amendment: Another Free Speech Showdown in Cyberspace?’ Journal of Broadcasting and Electronic Media 43 IssueID4 670–689
K. C. Schrøder (2002) ‘Discourses of Fact’ K. B. Jensen (Eds) A Handbook of Media and Communication Research Routledge London 98–116
Schwartz, J.: 2001, Seeking Privacy Online, Even as Security Tightens, New York Times, November 11, 3.10
B. Shapiro C. R. Baker (2001) ArticleTitle‘Information Technology and the Social Construction of Information Privacy’ Journal of Accounting and Public Policy 20 IssueID4–5 295–322
A. D. Smith W. T. Rupp (2004) ArticleTitle‘Online Privacy Policies and Diffusion Theory Perspectives: Security or Chaos?’ Services Marketing Quarterly 25 IssueID3 53–75 Occurrence Handle10.1300/J396v25n03_04
B. C. Stahl (2004) ArticleTitle‘Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics?’ Journal of Organizational and End User Computing 16 IssueID3 59–77
B. A. Stead J. Gilbert (2001) ArticleTitle‘Ethical Issues in Electronic Commerce’ Journal of Business Ethics 34 IssueID2 75–85 Occurrence Handle10.1023/A:1012266020988
J. B. Stiff (1994) Persuasive Communication Guilford New York
M. Stubbs (1996) Text and Corpus Analysis. Computer-Assisted Studies of Language and Culture Blackwell Oxford
T. A. Van Dijk (1997) ‘Discourse as Interaction in Society’ T. A. Dijk ParticleVan (Eds) Discourse as Social Interaction NumberInSeriesvol 2 Sage London 1–37
L. Wel ParticleVan L. Royakkers (2004) ArticleTitle‘Ethical Issues in Web Data Mining’ Ethics and Information Technology 6 IssueID2 129–140
M. G. Velasquez (2002) Business Ethics. Concepts and Cases EditionNumber5 Prentice Hall Upper Saddle River
S. Warren L. Brandeis (1890) ArticleTitle‘The Right of Privacy’ Harvard Law Review 4 IssueID5 193–220
P. C. Wason (1965) ArticleTitle‘The Contexts of Plausible Denial’ Journal of Verbal Learning and Verbal Behavior 4 7–11 Occurrence Handle10.1016/S0022-5371(65)80060-3
L. R. Weber A. Carter (1998) ArticleTitle‘On Constructing Trust: Temporality, Self-Disclosure, and Perspective-Taking’ The International Journal of Sociology and Social Policy 18 IssueID1 7–26 Occurrence Handle10.1108/01443339810788290
A. F. Westin (1967) Privacy and Freedom Atheneum New York
Q. Zhang (1998) ArticleTitle‘Fuzziness – Vagueness – Generality – Ambiguity’ Journal of Pragmatics 29 IssueID1 13–31 Occurrence Handle10.1016/S0378-2166(97)00014-3
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Pollach, I. A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent. J Bus Ethics 62, 221–235 (2005). https://doi.org/10.1007/s10551-005-7898-3
Issue Date:
DOI: https://doi.org/10.1007/s10551-005-7898-3