Profiling the Mobile Customer – Is Industry Self-Regulation Adequate to Protect Consumer Privacy When Behavioural Advertisers Target Mobile Phones? – Part II Public Deposited

http://ir.library.oregonstate.edu/concern/defaults/3484zh52f

This is the authors’ revised personal version of the text of the final journal article (to reflect changes made in the peer review process). The final published version can be found at:  http://www.sciencedirect.com/science/journal/02673649

Descriptions

Attribute NameValues
Creator
Abstract or Summary
  • Mobile customers are increasingly being tracked and profiled by behavioural advertisers to enhance delivery of personalized advertising. This type of profiling relies on automated processes that mine databases containing personally-identifying or anonymous consumer data, and it raises a host of significant concerns about privacy and data protection. This second article in a two part series on “Profiling the Mobile Customer” explores how to best protect consumers’ privacy and personal data through available mechanisms that include industry self-regulation, privacy-enhancing technologies and legislative reform.1 It discusses how well privacy and personal data concerns related to consumer profiling are addressed by two leading industry self-regulatory codes from the United Kingdom and the U.S. that aim to establish fair information practices for behavioural advertising by their member companies. It also discusses the current limitations of using technology to protect consumers from privacy abuses related to profiling. Concluding that industry self-regulation and available privacy-enhancing technologies will not be adequate to close important privacy gaps related to consumer profiling without legislative reform, it offers suggestions for EU and U.S. regulators about how to do this.
Resource Type
DOI
Date Available
Date Issued
Citation
  • King, N. J., & Jessen, P. W. (2010). Profiling the mobile customer – Is Industry Self-Regulation Adequate to Protect Consumer Privacy When Behavioural Advertisers Target Mobile Phones? – Part II. Computer Law and Security Review, 26(6), 595-612. doi:10.1016/j.clsr.2010.09.007
Series
Keyword
Rights Statement
Publisher
Language
Replaces
Additional Information
  • description.provenance : Submitted by Sue Kunda (sue.kunda@oregonstate.edu) on 2010-12-02T00:52:08Z No. of bitstreams: 2 KingJessenProfilingPartIIPostPrint2010.pdf: 381044 bytes, checksum: 6eaf69357f9c403ab3eef6f415c6a09e (MD5) KingJessenProfilingPartII.Exhibit.pdf: 89593 bytes, checksum: 1d9f57f58a9fc92ad468d1b9cdb41ae7 (MD5)
  • description.provenance : Approved for entry into archive by Sue Kunda(sue.kunda@oregonstate.edu) on 2010-12-02T00:55:03Z (GMT) No. of bitstreams: 2 KingJessenProfilingPartIIPostPrint2010.pdf: 381044 bytes, checksum: 6eaf69357f9c403ab3eef6f415c6a09e (MD5) KingJessenProfilingPartII.Exhibit.pdf: 89593 bytes, checksum: 1d9f57f58a9fc92ad468d1b9cdb41ae7 (MD5)
  • description.provenance : Made available in DSpace on 2010-12-02T00:55:04Z (GMT). No. of bitstreams: 2 KingJessenProfilingPartIIPostPrint2010.pdf: 381044 bytes, checksum: 6eaf69357f9c403ab3eef6f415c6a09e (MD5) KingJessenProfilingPartII.Exhibit.pdf: 89593 bytes, checksum: 1d9f57f58a9fc92ad468d1b9cdb41ae7 (MD5) Previous issue date: 2010-11

Relationships

In Administrative Set:
Last modified: 07/08/2017 Default
Citations:

EndNote | Zotero | Mendeley

Items