Understanding Consumer Information Privacy in the Realm of Internet Commerce: Personhood and Pragmatism, Pop-Tarts and Six-Packs*

By DeMarco, David A. | Texas Law Review, March 2006 | Go to article overview

Understanding Consumer Information Privacy in the Realm of Internet Commerce: Personhood and Pragmatism, Pop-Tarts and Six-Packs*


DeMarco, David A., Texas Law Review


"I'm not a lawyer. That's why I can see what the law is like. It's like a single-bed blanket on a double bed and three folks in the bed and a cold night. There ain't ever enough blanket to cover the case, no matter how much pulling and hauling, and somebody is always going to nigh catch pneumonia."1

As e-commerce has expanded and evolved over the past decade,2 so have methods of collecting, organizing, and analyzing the data that unwitting consumers make available to interested commercial entities as they venture through cyberspace. Commentators, courts, consumer advocates, policymakers, regulators, and e-businesses have struggled to imagine systems that could safeguard consumer privacy while maximizing commercial interests in capitalizing on the back and forth stream of information that constitutes the Internet.3 An assumption that commercial entities violate consumer privacy by collecting data from Internet transactions pervades the information privacy discourse,4 but in this Note I seek to interrogate that assumption by focusing on the actual processes through which consumer data are collected as well as the broader dynamics of the interactions between consumers and interested commercial parties.

While the wholesale aggregation and disposition of consumer data may well pose a viable threat to consumer interests in certain contexts,5 I have found that the extant schema of legal and extralegal checks on the manner in which commercial entities may employ Internet-derived consumer information is broader and more protective of consumers than is generally recognized. However, although these protections are broad, an examination of their imperfect and improvisational nature reveals that business interests still generally prevail over consumer interests under the current regime.

Nevertheless, I seek to demonstrate how certain privacy scholars exaggerate both the probability and the actual extent of harm suffered by individuals as a result of commercial data aggregation. It is my position that many privacy scholars make their case by overemphasizing the tenuous link between personal information and person/hood.6 By taking a measured look at both the context in which most Internet information privacy concerns arise and the existing system regulating the collection of such information, I attempt to expose some of the shortcomings of certain academic abstractions characterizing what is at stake with respect to consumer information privacy on the Internet.

After all, we are no more defined by the junk email in our inboxes or the ads flashing across our screens than we are defined by the junkmail in our mailboxes or the ads on television programs. Fundamentally, e-tailers are not too different from brick-and-mortar retailers-they just want to sell us stuff. Lots of stuff. More stuff than we need, if they can just figure out how to tell us what we need. Businesses collect consumer data so that they can more effectively market their products, not, as some would argue, to hijack our identities for any sort of dark, Orwellian purpose. While any such motives-if they existed and if a company were willing to follow through with them-would make for an engaging conspiracy narrative, once such motives made their way into public view, it would be very, very bad for business.

In this Note, I portray the nature and extent of information exchanged between consumers and "commercial websites"7 and information exchanged between consumers and third party advertising companies that commercial websites hire to manage their Internet advertising practices. I do not examine spyware or adware utilized by a certain fringe sector of e-commerce participants8 but instead focus on information technologies employed by more reputable companies. Nor do I give extensive treatment to the issues raised by information crimes such as identity theft, other than to the limited extent that the threat of identity theft arises in the context of transactions between consumers and commercial websites. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Understanding Consumer Information Privacy in the Realm of Internet Commerce: Personhood and Pragmatism, Pop-Tarts and Six-Packs*
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.