The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - June (2013 vol.46)
pp: 60-67
Pauline Anthonysamy , Lancaster University, UK
Phil Greenwood , Lancaster University, UK
Awais Rashid , Lancaster University, UK
ABSTRACT
A proposed method for mapping privacy policy statements to privacy controls can help providers improve data management transparency, thereby increasing user trust.
INDEX TERMS
Privacy, Data privacy, Social network services, Government policies, Advertising, Electronic mail, Information management, privacy, social networks, traceability
CITATION
Pauline Anthonysamy, Phil Greenwood, Awais Rashid, "Social Networking Privacy: Understanding the Disconnect from Policy to Controls", Computer, vol.46, no. 6, pp. 60-67, June 2013, doi:10.1109/MC.2012.326
REFERENCES
1. “Protection of Personal Data—European Commission Data Directive 95/46/ec, 2011; www.eur-lex.europa.eu/lexuriservlexuriserv.do?uri=celex:31995l0046:en:not .
2. “Federal Trade Commission Privacy Online: Fair Information Practices in the Electronic Marketplace,” 2000; www.ftc.gov/reportsprivacy3.
3. R. Singh, M. Sumeeth, and J. Miller, “A User-Centric Evaluation of the Readability of Privacy Policies in Popular Web Sites,” Information Systems Frontiers, Feb. 2010, pp. 1-14.
4. M. Majeski, M. Johnson, and S.M. Bellovin, The Failure of Online Social Network Privacy Settings, tech. report CUCS-010-11, Columbia Univ., 2011.
5. J. Young, “Commitment Analysis to Operationalize Software Requirements from Privacy Policies,” Requirements Eng., vol. 16, no. 1, 2011, pp. 33-46.
6. J. Young and A. Antón, “A Method for Identifying Software Requirements Based on Policy Commitments,” Proc. 18th Int'l Conf. Requirements Eng. (RE 10), IEEE CS, 2010, pp. 47-56.
7. T. Breaux and A. Antón, “Analyzing Regulatory Rules for Privacy and Security Requirements,” IEEE Trans. Software Eng., Jan. 2008, pp. 5-20.
8. P. Anthonysamy, A. Rashid, and P. Greenwood, “Do the Privacy Policies Reflect the Privacy Controls on Social Networks?” Proc. Int'l Conf. Privacy, Security, Risk and Trust (PASSAT 11), IEEE CS, 2011, pp. 1155-1158.
9. P. Anthonysamy, P. Greenwood, and A. Rashid, “A Method for Analysing Traceability Between Privacy Policies and Privacy Controls of Online Social Networks,” Proc. Ann. Privacy Forum: Closing the Loop from Research to Policy, Lancaster Univ.;www.comp.lancs.ac.uk/~anthonyspublication.html .
10. B. Glaser and A. Strauss, The Discovery of Grounded Theory: Strategies for Qualitative Research, Aldine Transaction, 1967.
11. A.I. Antón and J.B. Earp, “A Requirements Taxonomy for Reducing Web Site Privacy Vulnerabilities,” Requirements Eng., vol. 9, 2004, pp. 169-195.
12. J. Bonneau and S. Preibusch, “The Privacy Jungle: On the Market for Data Protection in Social Networks,” Economics of Information Security and Privacy, Springer 2010, pp. 121-167.
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool