21,321 research outputs found
Nutrition Labeling in the United States and the Role of Consumer Processing, Message Structure, and Moderating Conditions
It has been since 1990 that the landmark Nutritional Labeling Education Act (NLEA) was passed in the United States, and since 1969 that the first White House Conference on Food, Nutrition and Health occurred. In the time since these important events, considerable research has been conducted on how U.S. consumers process and use nutritional labeling. An up-to-date review of nutritional labeling research must address key findings on the processing and use of nutrition facts panels (NFPs), restaurant labeling, front-of-pack (FOP) symbols, health and nutrient content claims, new labeling efforts (e.g., for meat products), and claims not regulated by the U.S. Food and Drug Administration (FDA). Message structure mediates the ways in which consumers process nutritional labeling while moderating conditions affect research outcomes associated with labeling efforts.
The most recent policy issues and problems to be considered (e.g., by the FDA) include nutritional labeling as well as identifying opportunities for consumer research in helping to promote healthy lifestyles and reducing obesity in the United States and throughout the world. For example, several unanswered research questions remain regarding how the proposed changes to the NFPs—beef, poultry, and seafood labeling; restaurant chain calorie labeling; alternative FOP formats; and regulated and unregulated health and nutrient content claims—will affect consumers. Researchers have yet to examine not only these different labeling and nutrition information formats, but also how they might interact with one another and the role of key moderating conditions (e.g., one’s motivation, ability opportunity to process nutrition information) in affecting consumer processing and behavior
Privacy CURE: Consent Comprehension Made Easy
Although the General Data Protection Regulation (GDPR) defines several potential legal bases for personal data processing, in many cases data controllers, even when they are located outside the European Union (EU), will need to obtain consent from EU citizens for the processing of their personal data. Unfortunately, existing approaches for obtaining consent, such as pages of text followed by an agreement/disagreement mechanism, are neither specific nor informed. In order to address this challenge, we introduce our Consent reqUest useR intErface (CURE) prototype, which is based on the GDPR requirements and the interpretation of those requirements by the Article 29 Working Party (i.e., the predecessor of the European Data Protection Board). The CURE prototype provides transparency regarding personal data processing, more control via a customization, and, based on the results of our usability evaluation, improves user comprehension with respect to what data subjects actually consent to. Although the CURE prototype is based on the GDPR requirements, it could potentially be used in other jurisdictions also
An Automated Approach to Auditing Disclosure of Third-Party Data Collection in Website Privacy Policies
A dominant regulatory model for web privacy is "notice and choice". In this
model, users are notified of data collection and provided with options to
control it. To examine the efficacy of this approach, this study presents the
first large-scale audit of disclosure of third-party data collection in website
privacy policies. Data flows on one million websites are analyzed and over
200,000 websites' privacy policies are audited to determine if users are
notified of the names of the companies which collect their data. Policies from
25 prominent third-party data collectors are also examined to provide deeper
insights into the totality of the policy environment. Policies are additionally
audited to determine if the choice expressed by the "Do Not Track" browser
setting is respected.
Third-party data collection is wide-spread, but fewer than 15% of attributed
data flows are disclosed. The third-parties most likely to be disclosed are
those with consumer services users may be aware of, those without consumer
services are less likely to be mentioned. Policies are difficult to understand
and the average time requirement to read both a given site{\guillemotright}s
policy and the associated third-party policies exceeds 84 minutes. Only 7% of
first-party site policies mention the Do Not Track signal, and the majority of
such mentions are to specify that the signal is ignored. Among third-party
policies examined, none offer unqualified support for the Do Not Track signal.
Findings indicate that current implementations of "notice and choice" fail to
provide notice or respect choice
The control over personal data: True remedy or fairy tale ?
This research report undertakes an interdisciplinary review of the concept of
"control" (i.e. the idea that people should have greater "control" over their
data), proposing an analysis of this con-cept in the field of law and computer
science. Despite the omnipresence of the notion of control in the EU policy
documents, scholarly literature and in the press, the very meaning of this
concept remains surprisingly vague and under-studied in the face of
contemporary socio-technical environments and practices. Beyond the current
fashionable rhetoric of empowerment of the data subject, this report attempts
to reorient the scholarly debates towards a more comprehensive and refined
understanding of the concept of control by questioning its legal and technical
implications on data subject\^as agency
Building trustworthy e-Commerce wesite
The process of building consumer trust in E-Commerce is based on the presence of trust features or trust attributes in the websites. Consumer may examine e-Commerce websites for the existence of trust attributes. However, to date, which trust attributes contribute to the website’s trustworthiness and which trust attributes give more value to consumer has not been adequately explored. Therefore, the purpose of the paper is to look for the relevant trust attributes for e-Commerce websites and to identify the importance ranking of trust attributes that contribute significantly to the trustworthiness of e-Commerce website. Various journal papers and articles related to e-Commerce field have been referred in order to identify the trust attributes. An online survey that received 1230 respondents was carried out to investigate the importance ranking of ten trust attributes. The paper contributes to the discussion on how to build trust in e-Commerc
Trustworthy Privacy Indicators: Grades, Labels, Certifications, and Dashboards
Despite numerous groups’ efforts to score, grade, label, and rate the privacy of websites, apps, and network-connected devices, these attempts at privacy indicators have, thus far, not been widely adopted. Privacy policies, however, remain long, complex, and impractical for consumers. Communicating in some short-hand form, synthesized privacy content is now crucial to empower internet users and provide them more meaningful notice, as well as nudge consumers and data processors toward more meaningful privacy. Indeed, on the basis of these needs, the National Institute of Standards and Technology and the Federal Trade Commission in the United States, as well as lawmakers and policymakers in the European Union, have advocated for the development of privacy indicator systems.
Efforts to develop privacy grades, scores, labels, icons, certifications, seals, and dashboards have wrestled with various deficiencies and obstacles for the wide-scale deployment as meaningful and trustworthy privacy indicators. This paper seeks to identify and explain these deficiencies and obstacles that have hampered past and current attempts. With these lessons, the article then offers criteria that will need to be established in law and policy for trustworthy indicators to be successfully deployed and adopted through technological tools. The lack of standardization prevents user-recognizability and dependability in the online marketplace, diminishes the ability to create automated tools for privacy, and reduces incentives for consumers and industry to invest in privacy indicators. Flawed methods in selection and weighting of privacy evaluation criteria and issues interpreting language that is often ambiguous and vague jeopardize success and reliability when baked into an indicator of privacy protectiveness or invasiveness. Likewise, indicators fall short when those organizations rating or certifying the privacy practices are not objective, trustworthy, and sustainable.
Nonetheless, trustworthy privacy rating systems that are meaningful, accurate, and adoptable can be developed to assure effective and enduring empowerment of consumers. This paper proposes a framework using examples from prior and current attempts to create privacy indicator systems in order to provide a valuable resource for present-day, real world policymaking.
First, privacy rating systems need an objective and quantifiable basis that is fair and accountable to the public. Unlike previous efforts through industry self-regulation, if lawmakers and regulators establish standardized evaluation criteria for privacy practices and provide standards for how these criteria should be weighted in scoring techniques, the rating system will have public accountability with an objective, quantifiable basis. If automated rating mechanisms convey to users accepted descriptions of data practices or generate scores from privacy statements based on recognized criteria and weightings rather than from deductive conclusions, then this reduces interpretive issues with any privacy technology tool. Second, rating indicators should align with legal principles of contract interpretation and the existing legal defaults for the interpretation of silence in privacy policy language. Third, a standardized system of icons, along with guidelines as to where these should be located, will reduce the education and learning curve now necessary to understand and benefit from many different, inconsistent privacy indicator labeling systems. And lastly, privacy rating evaluators must be impartial, honest, autonomous, and financially and operationally durable in order to be successful
The live social semantics application: A platform for integrating face-to-face presence with on-line social networking
We describe a novel application that integrates real-world data on the face-to-face proximity of individuals with their identities and contacts in on-line social networks. This application was successfully deployed at two conference gatherings, ESWC09 and HT2009, and actively used by hundreds of people. Personal profiles of the participants were automatically generated using several Web 2.0 systems and semantic data sources, and integrated in real-time with face-to-face proximity relations detected using RFID-enabled badges. The integration of these heterogeneous data sources enables various services that enhance the experience of conference attendees, allowing them to explore their social neighbourhood and to connect with other participants. This paper describes the architecture of the application, the services we provided, and the results we achieved in these deployments
- …