A best practice model for e-consumer protection

Dan Svantesson, Roger Clarke

Research output: Contribution to journalArticleResearchpeer-review

15 Citations (Scopus)

Abstract

This article outlines a set of criteria for assessing the value of e-consumer protection schemes. It is intended that it be used as a tool, for policy-makers, industry associations, corporations and consumer organisations in all jurisdictions, seeking to assess the appropriateness of their consumer protection regulation. It can be used to devise new, or improve existing, policies, and it can also be used to compare the usefulness of e-consumer protection in different jurisdictions. It commences with a brief review of existing frameworks for the protection of e-consumers, which demonstrates the need for a model that uncompromisingly presents the needs of consumers. An overview of the model is provided, followed by a presentation of the model's key features. A further section identifies the several ways in which the model can be applied in order to improve the usefulness of e-consumer protection. An earlier version of the model was published in checklist form (Clarke R. 'A Major Impediment to B2C Success is ... the Concept 'B2C' Invited Keynote, Proc. ICEC'06, Fredericton NB, Canada, 14-16 August 2006, at http://www.rogerclarke.com/EC/ICEC06.html#TNT). The present article revises and expands that checklist, and presents the rationale underlying each item in it.

Original languageEnglish
Pages (from-to)31-37
Number of pages7
JournalComputer Law and Security Review
Volume26
Issue number1
DOIs
Publication statusPublished - Jan 2010

Fingerprint

Consumer protection
consumer protection
best practice
jurisdiction
European Community
corporation
Industry
Best practice
Canada
regulation
industry
Values

Cite this

@article{be3692d6730945af8c976a8e21d146ef,
title = "A best practice model for e-consumer protection",
abstract = "This article outlines a set of criteria for assessing the value of e-consumer protection schemes. It is intended that it be used as a tool, for policy-makers, industry associations, corporations and consumer organisations in all jurisdictions, seeking to assess the appropriateness of their consumer protection regulation. It can be used to devise new, or improve existing, policies, and it can also be used to compare the usefulness of e-consumer protection in different jurisdictions. It commences with a brief review of existing frameworks for the protection of e-consumers, which demonstrates the need for a model that uncompromisingly presents the needs of consumers. An overview of the model is provided, followed by a presentation of the model's key features. A further section identifies the several ways in which the model can be applied in order to improve the usefulness of e-consumer protection. An earlier version of the model was published in checklist form (Clarke R. 'A Major Impediment to B2C Success is ... the Concept 'B2C' Invited Keynote, Proc. ICEC'06, Fredericton NB, Canada, 14-16 August 2006, at http://www.rogerclarke.com/EC/ICEC06.html#TNT). The present article revises and expands that checklist, and presents the rationale underlying each item in it.",
author = "Dan Svantesson and Roger Clarke",
year = "2010",
month = "1",
doi = "10.1016/j.clsr.2009.11.006",
language = "English",
volume = "26",
pages = "31--37",
journal = "Computer Law and Security Review",
issn = "0267-3649",
publisher = "Elsevier",
number = "1",

}

A best practice model for e-consumer protection. / Svantesson, Dan; Clarke, Roger.

In: Computer Law and Security Review, Vol. 26, No. 1, 01.2010, p. 31-37.

Research output: Contribution to journalArticleResearchpeer-review

TY - JOUR

T1 - A best practice model for e-consumer protection

AU - Svantesson, Dan

AU - Clarke, Roger

PY - 2010/1

Y1 - 2010/1

N2 - This article outlines a set of criteria for assessing the value of e-consumer protection schemes. It is intended that it be used as a tool, for policy-makers, industry associations, corporations and consumer organisations in all jurisdictions, seeking to assess the appropriateness of their consumer protection regulation. It can be used to devise new, or improve existing, policies, and it can also be used to compare the usefulness of e-consumer protection in different jurisdictions. It commences with a brief review of existing frameworks for the protection of e-consumers, which demonstrates the need for a model that uncompromisingly presents the needs of consumers. An overview of the model is provided, followed by a presentation of the model's key features. A further section identifies the several ways in which the model can be applied in order to improve the usefulness of e-consumer protection. An earlier version of the model was published in checklist form (Clarke R. 'A Major Impediment to B2C Success is ... the Concept 'B2C' Invited Keynote, Proc. ICEC'06, Fredericton NB, Canada, 14-16 August 2006, at http://www.rogerclarke.com/EC/ICEC06.html#TNT). The present article revises and expands that checklist, and presents the rationale underlying each item in it.

AB - This article outlines a set of criteria for assessing the value of e-consumer protection schemes. It is intended that it be used as a tool, for policy-makers, industry associations, corporations and consumer organisations in all jurisdictions, seeking to assess the appropriateness of their consumer protection regulation. It can be used to devise new, or improve existing, policies, and it can also be used to compare the usefulness of e-consumer protection in different jurisdictions. It commences with a brief review of existing frameworks for the protection of e-consumers, which demonstrates the need for a model that uncompromisingly presents the needs of consumers. An overview of the model is provided, followed by a presentation of the model's key features. A further section identifies the several ways in which the model can be applied in order to improve the usefulness of e-consumer protection. An earlier version of the model was published in checklist form (Clarke R. 'A Major Impediment to B2C Success is ... the Concept 'B2C' Invited Keynote, Proc. ICEC'06, Fredericton NB, Canada, 14-16 August 2006, at http://www.rogerclarke.com/EC/ICEC06.html#TNT). The present article revises and expands that checklist, and presents the rationale underlying each item in it.

UR - http://www.scopus.com/inward/record.url?scp=74549134670&partnerID=8YFLogxK

U2 - 10.1016/j.clsr.2009.11.006

DO - 10.1016/j.clsr.2009.11.006

M3 - Article

VL - 26

SP - 31

EP - 37

JO - Computer Law and Security Review

JF - Computer Law and Security Review

SN - 0267-3649

IS - 1

ER -