THE SPAM ISSUE IN MOBILE BUSINESS A COMPARATIVE REGULATORY OVERVIEW

The emerging mobile industry is expected to be characterized by increasingly personalized and location-based services. Among these services, personalized mobile marketing and advertisement services are predicted to be particularly important. However, besides the excitement about the potential innovative one-to-one marketing strategies enabled by the mobile medium, growing concerns are been raised about the protection of the users’ privacy from what can become extremely intrusive practices in an intimate personal space. There is indeed a thin line between providing useful services and bombarding the user with mobile spam. Conscious of the importance of solving this sensible issue, the mobile marketing association itself has issued privacy guidelines to its members. However, because this self regulation has proven weak in protecting users from abuses, regulatory bodies throughout the world have issued laws to protect user privacy. This paper illustrates and compares the regulatory frameworks of Switzerland, the European Union and the United States, and analyzes their likely implications for the mobile business industry.

[1]  Herman T. Tavani,et al.  Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.

[2]  A. Westin,et al.  The assault on privacy , 1971 .

[3]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[4]  Lorrie Faith Cranor,et al.  Internet privacy , 1999, CACM.

[5]  Peter G. Keen,et al.  The Freedom Economy: Gaining the mCommerce Edge in the Era of the Wireless Internet , 2001 .

[6]  Ravi Kalakota,et al.  M-Business: The Race to Mobility , 2001 .

[7]  C. Goodwin Privacy: Recognition of a Consumer Right , 1991 .

[8]  Shuk Ying Ho,et al.  The attraction of personalized service for users in mobile commerce: an empirical study , 2002, SECO.

[9]  Robert C. Nickerson,et al.  Issues in Mobile E-Commerce , 2002, Commun. Assoc. Inf. Syst..

[10]  George M. Giaglis,et al.  Towards a classification framework for mobile location services , 2003 .

[11]  Penn Ivo Bluetooth and security , 2004, Other Conferences.

[12]  William A. Arbaugh,et al.  Security problems in 802.11-based networks , 2003, CACM.

[13]  Trevor Darrell,et al.  Privacy in Context , 2001, Hum. Comput. Interact..

[14]  Chen Wang,et al.  Consumer privacy concerns about Internet marketing , 1998, CACM.

[15]  K. Sheehan,et al.  Dimensions of Privacy Concern among Online Consumers , 2000 .

[16]  Communication from the European commission to the council, the European parliament, the economic and social committee and committee of the regions , 2002 .

[17]  Wei-Pang Yang,et al.  Enhanced privacy and authentication for the global system for mobile communications , 1999, Wirel. Networks.

[18]  Neil Vidmar,et al.  Concern for Personal Privacy in an Electronic Age. , 1985 .

[19]  Norman Sadeh,et al.  M-Commerce: Technologies, Services, and Business Models , 2002 .

[20]  Priscilla M. Regan Privacy and Commercial Use of Personal Data: Policy Developments in the United States , 2003 .

[21]  David E. Sorkin Technical and Legal Approaches to Unsolicited Electronic Mail , 2001 .

[22]  Eija Kaasinen,et al.  User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.

[23]  P. Lunt,et al.  Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control , 2004 .

[24]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[25]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .