Examining a Norwegian Client’s Response over Information Security and Privacy Policy

Murtaza Hussain (1), Noor Ahmed Ansari (2)
(1) Member, IEEE Norway
(2) London College of International Business Studies, United Kingdom.
Fulltext View | Download
How to cite (IJASEIT) :
Hussain, Murtaza, and Noor Ahmed Ansari. “Examining a Norwegian Client’s Response over Information Security and Privacy Policy”. International Journal on Advanced Science, Engineering and Information Technology, vol. 5, no. 3, May 2015, pp. 165-9, doi:10.18517/ijaseit.5.3.499.
The core purpose of this article is to investigate how different a Norwegian subscriber’s point of view about the terminology of understandability, technicality, importance and awareness of privacy policy. Indeed this research article has its demographic limits and was targeted for Norwegian clients but it may suggest a first step to reshape policy for better realization. The emerging ambiguity in information security has raised much privacy and trust issues that are context dependent. Therefore there are several uncertainties and risks seen today concerning the privacy policy & subscriber trust. It is a responsibility of services providers before amending their policy to notify their subscribers. Since if they do not take this initiative then it creates trust deficit for their subscribers and this affects their business and goodwill. For this article we have adopted a survey questionnaire methodology based on clients’ own perspectives. Generally observed that, before accepting privacy policy, it`s hard to read these policies and understood by common user, and taking this prospect ahead, many policies & regulations have a difficult context to recognize.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).