Examining a Norwegian Clients Response over Information Security and Privacy Policy

α
Murtaza Hussain Shaikh
Murtaza Hussain Shaikh
α Member IEEE, Oslo Norway

Send Message

To: Author

Examining a Norwegian Clients Response over Information Security and Privacy Policy

Article Fingerprint

ReserarchID

CSTIT3810A

Examining a Norwegian Clients Response over Information Security and Privacy Policy Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

The core purpose of this article is to investigate how different a Norwegian subscriber’s point of view about the terminology of understandability, technicality, importance and awareness of privacy policy. Indeed this research article has its demographic limits and was targeted for Norwegian clients but it may suggest a first step to reshape policy for better realization. The emerging ambiguity in information security has raised much privacy and trust issues that are context dependent. Therefore there are several uncertainties and risks seen today concerning the privacy policy & subscriber trust. It is a responsibility of services providers before amending their policy to notify their subscribers. Since if they do not take this initiative then it creates trust deficit for their subscribers and this affects their business and goodwill.

References

25 Cites in Article
  1. Samuel Warren,Louis Brandeis (1890). The Right to Privacy.
  2. Serge David,F Michael (2009). Privacy, trust and policy-making: Challenges & Responses.
  3. J Karat,C.-M Karat,C Brodie,J Feng (2011). Privacy in information technology: Designing to enable privacy policy management in organizations.
  4. Xiang Cao,Lee Iverson (2006). Intentional access management.
  5. C Brodie,C Karat,J Karat,J Feng (2006). Usable Security and Privacy: "A case study of developing privacy management tools.
  6. (2010). Wikipedia: The Free Encyclopedia.
  7. A Piero,L Juri,O Daniel,S Luigi (2007). Rulebased policy representations and reasoning.
  8. H Smith,Sandra Milberg,Sandra Burke (1996). Information Privacy: Measuring Individuals’ Concerns About Organizational Practices1.
  9. T Wham (2001). FTC data analysis. [Federal Trade Commission].
  10. (2001). Identity Theft: New Survey & Trend Report.
  11. M Milne (2001). The Culnan-Milne Survey on consumers & online privacy notices: Summary of Responses.
  12. A Anton,J Earp,Qingfeng He,W Stufflebeam,D De Bolchini,C Jensen (2004). Financial privacy policies and the need for standardization.
  13. Davide Bolchini,Qingfeng He,Annie Antón,William Stufflebeam (2004). “I Need It Now”: Improving Website Usability by Contextualizing Privacy Policies.
  14. Joseph Bonneau,Sören Preibusch (2009). The Privacy Jungle:On the Market for Data Protection in Social Networks.
  15. Patrick Kelley,Joanna Bresee,Lorrie Cranor,Robert Reeder (2009). A "nutrition label" for privacy.
  16. Matt Bishop (2002). Computer security: art and science.
  17. W Chung,J Paynter (2002). Privacy Issues on the Internet.
  18. W Hancock (1997). Take gasket advice from your hard drive.
  19. M Krauss (2000). You may ask yourself: Do I buy the best, or the bargain?.
  20. David Meinert,Dane Peterson,John Criswell,Martin Crossland (2006). Privacy Policy Statements and Consumer Willingness to Provide Personal Information.
  21. G Milne,M Culnan (2004). Strategies for reducing online privacy risks. Why consumers read, online privacy notices.
  22. France Belanger,Janine Hiller,Wanda Smith (2002). Trustworthiness in electronic commerce: the role of privacy, security, and site attributes.
  23. D Schartum,L Bygrave (2004). OECDs retningslinjer for personvern og utveksling av personopplysninger over landegrenser.
  24. Eudpd (1995). Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.
  25. Dag Wiese Schartum (2000). Lov om behandling av personopplysninger.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Murtaza Hussain Shaikh. 2015. \u201cExamining a Norwegian Clients Response over Information Security and Privacy Policy\u201d. Global Journal of Computer Science and Technology - H: Information & Technology GJCST-H Volume 15 (GJCST Volume 15 Issue H1): .

Download Citation

Issue Cover
GJCST Volume 15 Issue H1
Pg. 19- 24
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-H Classification: C.2.0
Version of record

v1.2

Issue date

June 23, 2015

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 7905
Total Downloads: 2139
2026 Trends
Related Research

Published Article

The core purpose of this article is to investigate how different a Norwegian subscriber’s point of view about the terminology of understandability, technicality, importance and awareness of privacy policy. Indeed this research article has its demographic limits and was targeted for Norwegian clients but it may suggest a first step to reshape policy for better realization. The emerging ambiguity in information security has raised much privacy and trust issues that are context dependent. Therefore there are several uncertainties and risks seen today concerning the privacy policy & subscriber trust. It is a responsibility of services providers before amending their policy to notify their subscribers. Since if they do not take this initiative then it creates trust deficit for their subscribers and this affects their business and goodwill.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Examining a Norwegian Clients Response over Information Security and Privacy Policy

Murtaza Hussain Shaikh
Murtaza Hussain Shaikh Member IEEE, Oslo Norway

Research Journals