Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Kuzma, Joanne (2011)
Publisher: ARPN Publishers
Languages: English
Types: Article
Subjects: AI, T1
Due to demand in online services, universities throughout the world are increasing the content of their Web sites and adding features, such as online applications and e-learning. However, adding online services requires that personal data is kept within computerized systems, thus putting personal private information at risk. Online consumers express concern about the risk of their personal private data and demand to know how organizations will protect their records. It is imperative that firms have mechanisms to guard their data and publish protection information within online privacy policies to mitigate user distrust. However, although industry privacy groups may recommend better protection and some countries may legislate its use; this is not universal in all university sites. This study analyzes 90 universities site throughout the world to determine the use of privacy protection. The results show a lack of use of certain privacy mechanisms. The research suggests methods for improving protection.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] A. Anton, E. Bertino, N. Li, and T. Yu, “A roadmap for comprehensive online privacy policy management”, Communications of the ACM, 2007, Vol. 50, No. 7, pp. 109-116.
    • [2] M. Desai, T. Richards, and K. Desai, “E-commerce policies and customer privacy”, Information Management & Computer Security, 2003, Vol. 11, No. 1, pp. 19-27.
    • [3] T. Hooper and M. Vos, “Establishing business integrity in an online environment: An examination of New Zealand web site privacy notices”, Online Information Review, 2009, Vol 33, No. 2, pp. 343- 361.
    • [4] F. Cate, “The Privacy and Security Policy Vacuum in Higher Education”, Educause Review, 2006, Vol. 41, No. 5, pp. 19-28.
    • [5] M. O'Donnell and C. Parker “How Colleges Can Navigate the Thicket of Federal Regulations”, Chronicle of Higher Education, 2005, Vol. 51, No. 38.
    • [6] C. Gurau, A. Ranchhod and C. Gauzente, “To legislate or not to legislate”: a comparative exploratory study of privacy/personalisation factors affecting French, UK and US Web sites”, Journal of Consumer Marketing, 2003, Vol. 20, No. 7, pp.652 - 664. http://www.cisjournal.org 
    • [7] Jamal, K., Maier, M. and Sunder, S. (2005), intention to consult privacy statements on municipal “Enforced Standards Versus Evolution by General websites”, Government Information Quarterly, Acceptance: A Comparative Study of E-Commerce 2010, Vol. 27, No. 3, pp. 238-244. Privacy Disclosure and Practice in the United States [15] M. Bhasin, “Guarding Privacy on the Internet”, and the United Kingdom” Journal of Accounting Global Business Review, 2006,Vol. 7, No. 1, pp. Research, Vol. 43, No. 1, pp. 73-96. 137-156.
    • [8] Z. Shalhoub, “Trust, privacy and security in [16] N. Bowie and K. Jamal, “Privacy Rights on the electronic business: the case of the CGG countries”, Internet, Self Regulation or Government Information Management & Computer Security, Regulation”, Business Ethics Quarterly, 2006, Vol. 2006, Vol. 14, No. 3, pp. 270-283. 16, No. 3, pp. 323-342.
    • [9] Asia-Pacific Economic Cooperation (APEC), [17] Nielsen Company, “Global Faces and Networked “APEC Privacy Framework”, 2005, Places: A Nielsen report on Social Networking's http://www.apec.org/Groups/Committee-on-Trade- New Global Footprint”, March 2009, and- http://blog.nielsen.com/nielsenwire/wpInvestment/~/media/Files/Groups/ECSG/05_ecsg_p content/uploads/2009/03/nielsen_globalfaces_mar0 rivacyframewk.ashx 9.pdf. niels
    • [10] P. Kumaraguru, L. Cranor, and E. Newton, E. [18] W3C, “The World Wide Web Security FAQ”, “Privacy Perceptions in India and the United States: 2003, An Interview Study”, In The 33rd Research http://www.w3.org/Security/Faq/wwwsf4.html. Conference on Communication, Information and [19] W3C, “Make Your Web Site P3P Compliant”, Internet Policy (TPRC), Sep 23 - Sep 25, 2005, The 2002, http://www.w3.org/P3P/details.html. National Center for Technology and Law, George [20] M. Culnan and T. Carlin, “Online privacy practices Mason University School of Law, USA. Available in higher education: making the grade?”, at: Communications of the ACM, 2009, Vol. 52, No. 3, http://www.cs.cmu.edu/~ponguru/tprc_2005_pk_lc pp. 126-130. _en.pdf. [21] M. Meade, “Data Security and Privacy at Colleges
    • [11] J. Tam, “Personal data privacy in the Asia Pacific: a and Universities”, The Computer & Internet real possibility”, Proceedings of the tenth Lawyer, 2009, Vol. 26, No. 10, pp. 26-31. conference on Computers, freedom and privacy, [22] HiSoftware, “HiSoftware Compliance Sheriff April 4-7, 2000, Toronto, ON, Canada. Privacy Module”, 2011,
    • [12] S. Bellman, E. Johnson, S. Kobrin and G. http://www.hisoftware.com/solutions/hisoftwareLohse, “International Differences in compliance-sheriff/privacy-reports.aspx. Information Privacy Concerns: A Global [23] W3C, “P3P Validator”, 2011 Survey of Consumers”, The Information http://www.w3.org/P3P/validator.html. Society, 2004, Vol. 20, No. 5, pp. 313-314. [24] Erigami, “Compliance monitoring of a corporate
    • [13] S. McRobb S. and Rogerson, “Are they really website: accessibility, privacy, quality, interactive listening? an investigation into published online activity”, 2011, privacy policies at the beginning of the third http://www.erigami.com/truwex/accessibilitymillennium”, Information Technology & People, privacy-monitoring.html. 2004, Vol. 17, No. 4, pp. 442-461. [25] 4ICU, “4ICU About Us”, 2011,
    • [14] A. Beldad, M. deJong, and M. Steehouder, M. http://www.4icu.org/menu/about.htm, “Reading the least read? Indicators of user's
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article