-
1
-
-
0012129087
-
David Chaum on Electronic Commerce: How Much Do You Trust Big Brother
-
November/December
-
Chaum, D., 1997. David Chaum on Electronic Commerce:How Much Do You Trust Big Brother. IEEE Internet Computing, November/December:8–16.
-
(1997)
IEEE Internet Computing
, pp. 8-16
-
-
Chaum, D.1
-
2
-
-
0033338075
-
Bundling Information Goods: Pricing, Profits, and Efficiency
-
December
-
Bakos, J., and Brynjolfsson, E., 1999. Bundling Information Goods:Pricing, Profits, and Efficiency. Management Science, 45 (12) December:1613–1630.
-
(1999)
Management Science
, vol.45
, Issue.12
, pp. 1613-1630
-
-
Bakos, J.1
Brynjolfsson, E.2
-
3
-
-
53349102510
-
Key Information Liability Issues Facing Managers: Software Piracy, Databases and Individual Rights to Privacy
-
June
-
Straub, D., and Collins, R., 1990. Key Information Liability Issues Facing Managers:Software Piracy, Databases and Individual Rights to Privacy. MIS Quarterly, June:143–156.
-
(1990)
MIS Quarterly
, pp. 143-156
-
-
Straub, D.1
Collins, R.2
-
4
-
-
85023866215
-
Do You Need a CPO?
-
June 1, June 1
-
Joss, M., June 1 2001. “ Do You Need a CPO? ”. In ComputerUser June 1, available at http://www.computeruser.com/articles/2006.1.2.0601.01.html
-
(2001)
ComputerUser
-
-
Joss, M.1
-
5
-
-
85023870344
-
Business Week-Harris Poll
-
March 20, issue
-
2000. Business Week-Harris Poll. Results printed in Business Week, March 20 issue
-
(2000)
Results printed in Business Week
-
-
-
6
-
-
23044526391
-
Ecommerce: Technologies That Do Steal!
-
March
-
Payton, F., 2001. Ecommerce:Technologies That Do Steal!. Decision Line, March:13–14.
-
(2001)
Decision Line
, pp. 13-14
-
-
Payton, F.1
-
7
-
-
21944436141
-
Ethical Management of Employee E-Mail Privacy
-
Winter
-
Sipior, J., 1998. Ethical Management of Employee E-Mail Privacy. Information Systems Management, 15 Winter:41–48.
-
(1998)
Information Systems Management
, vol.15
, pp. 41-48
-
-
Sipior, J.1
-
12
-
-
85023886053
-
Information Technology and the Future Enterprise: New Models for Managers
-
Upper Saddle River, NJ: Prentice-Hall
-
Mason, R., Culnan, M., Ang, S., Mason, F., Dickson, G., and DeSantis, G., 2001. “ Information Technology and the Future Enterprise:New Models for Managers ”. In Privacy in the Age of the Internet, Upper Saddle River, NJ:Prentice-Hall.
-
(2001)
Privacy in the Age of the Internet
-
-
Mason, R.1
Culnan, M.2
Ang, S.3
Mason, F.4
Dickson, G.5
DeSantis, G.6
-
13
-
-
0024011426
-
Information Technology and Dataveillance
-
May
-
Clarke, R., 1988. Information Technology and Dataveillance. Communications of the ACM, May:498–512.
-
(1988)
Communications of the ACM
, pp. 498-512
-
-
Clarke, R.1
-
16
-
-
85023878407
-
-
Proceedings of the ACM Conference on E-Commerce, Denver, CO
-
Ackerman, M., Cranor, L., and Reagle, J., Privacy in E-Commerce:Examining User Scenarios and Privacy Preferences. Proceedings of the ACM Conference on E-Commerce. Denver, CO
-
Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences
-
-
Ackerman, M.1
Cranor, L.2
Reagle, J.3
-
18
-
-
0001501223
-
How Did They Get My Name?: An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use
-
September
-
Culnan, M., 1993. How Did They Get My Name?:An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. MIS Quarterly, September:341
-
(1993)
MIS Quarterly
, pp. 341
-
-
Culnan, M.1
-
19
-
-
85023842065
-
-
Los Alamitos, CA: IEEE Computer Society Press
-
Baker, J., Warren, J., Thorwaldson, J., and Koball, B., Personal Information and Privacy, Proceedings of the First Conference on Computers, Freedom and Privacy. pp. 42–45. Los Alamitos, CA:IEEE Computer Society Press.
-
Personal Information and Privacy, Proceedings of the First Conference on Computers, Freedom and Privacy
, pp. 42-45
-
-
Baker, J.1
Warren, J.2
Thorwaldson, J.3
Koball, B.4
-
20
-
-
0012129103
-
Domestic and International Data Protection Issues
-
Washington, D.C.: Committee on Government Relations, U.S. House of Representatives, U.S. Government Printing Office
-
Westin, A., 1991. “ Domestic and International Data Protection Issues ”. In How the American Public Views Consumer Privacy Issues in the Early 90′s—And Why, Testimony before the Subcommittee on Government Information, Justice and Agriculture, 54–68. Washington, D.C.:Committee on Government Relations, U.S. House of Representatives, U.S. Government Printing Office.
-
(1991)
How the American Public Views Consumer Privacy Issues in the Early 90′s—And Why, Testimony before the Subcommittee on Government Information, Justice and Agriculture
, pp. 54-68
-
-
Westin, A.1
-
21
-
-
85023874609
-
-
Proceedings of the ACM Conference on Electronic Commerce EG'01, October
-
Spiekermann, S., Grossklags, J., and Bettina, B., E-privacy in 2nd Generation E-Commerce:Privacy Preferences versus Actual Behavior. Proceedings of the ACM Conference on Electronic Commerce EG'01. October.
-
E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior
-
-
Spiekermann, S.1
Grossklags, J.2
Bettina, B.3
-
22
-
-
84876638640
-
-
Gordon, H., Roth, S., Lieberman, S., Zeller, A., and McConnell, A., Customer Relationship Management:A Senior Management Guide to Technology for Creating a Customer-Centric Business available at http://www.the-dma.org/library/publications/customerrelationship.shtml
-
Customer Relationship Management: A Senior Management Guide to Technology for Creating a Customer-Centric Business
-
-
Gordon, H.1
Roth, S.2
Lieberman, S.3
Zeller, A.4
McConnell, A.5
-
24
-
-
85023826751
-
-
March, March, Washington, D.C
-
Artz, J., March 2001. Protecting Privacy in Cyberspace:Just Selfishness or Is It Immoral?, Presentation at George Washington University Seminar Series on the History of Recent Science March, Washington, D.C.
-
(2001)
Protecting Privacy in Cyberspace: Just Selfishness or Is It Immoral?, Presentation at George Washington University Seminar Series on the History of Recent Science
-
-
Artz, J.1
-
26
-
-
55249097295
-
Four Ethical Issues of the Information Age
-
June
-
Mason, R., 1986. Four Ethical Issues of the Information Age. MIS Quarterly, June:143–156.
-
(1986)
MIS Quarterly
, pp. 143-156
-
-
Mason, R.1
-
27
-
-
0012128177
-
President's Letter
-
May
-
White, J., 1991. President's Letter. Communications of the ACM, 34 (5) May:15–16.
-
(1991)
Communications of the ACM
, vol.34
, Issue.5
, pp. 15-16
-
-
White, J.1
-
28
-
-
85023788900
-
Privacy Excerpt from “Towards Digital eQuality: The U.S. Government Working Group on Electronic Commerce
-
December
-
Swire, P., 1999. Privacy Excerpt from “Towards Digital eQuality:The U.S. Government Working Group on Electronic Commerce”. 2nd Annual Report, December www.ecommerce.gov
-
(1999)
2nd Annual Report
-
-
Swire, P.1
-
29
-
-
3042727382
-
Privacy Online: Fair Information Practices in the Electronic Marketplace
-
May, May, Washington, D.C
-
Federal Trade Commission. May 2000. “ Privacy Online:Fair Information Practices in the Electronic Marketplace ”. In A Report to Congress May, Washington, D.C.
-
(2000)
A Report to Congress
-
-
-
30
-
-
85023860389
-
-
An International Comparative Study of Consumer Privacy on the Internet, January
-
Consumer International, Privacy@net:An International Comparative Study of Consumer Privacy on the Internet, January 2001.
-
(2001)
Privacy@net
-
-
-
32
-
-
85023797725
-
-
An up-to-date summary of pending privacy legislation can be found at the Center for Democracy and Technology Web site located at
-
An up-to-date summary of pending privacy legislation can be found at the Center for Democracy and Technology Web site located at http://www.cdt.org/legislation/107th/privacy
-
-
-
-
33
-
-
0012128179
-
HTTP Cookies: Standard, Privacy and Politics
-
November
-
Kristol, D., 2001. HTTP Cookies:Standard, Privacy and Politics. ACM Transactions on Internet Technology, 1 (2) November:151–198.
-
(2001)
ACM Transactions on Internet Technology
, vol.1
, Issue.2
, pp. 151-198
-
-
Kristol, D.1
-
34
-
-
85008065261
-
Cyberprivacy in the New Millenium
-
January
-
Berghel, H., 2001. Cyberprivacy in the New Millenium. IEEE Computer Magazine, 34 (1) January:133–134.
-
(2001)
IEEE Computer Magazine
, vol.34
, Issue.1
, pp. 133-134
-
-
Berghel, H.1
-
35
-
-
0035354413
-
Cookies and Web Bugs: What They Are and How They Work Together
-
Summer
-
Harding, W., 2001. Cookies and Web Bugs:What They Are and How They Work Together. Information Systems Management, Boston, 18 (3) Summer:17–25.
-
(2001)
Information Systems Management, Boston
, vol.18
, Issue.3
, pp. 17-25
-
-
Harding, W.1
-
37
-
-
0034269416
-
Attacking Malicious Code: A Report to the Infosec Research Council
-
September/October
-
McGraw, G., and Morrisett, G., 2000. Attacking Malicious Code:A Report to the Infosec Research Council. IEEE Software, September/October:33–41.
-
(2000)
IEEE Software
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
38
-
-
85023811528
-
Electronic Privacy Information Center
-
December, December, Washington, D.C
-
December 1999. “ Electronic Privacy Information Center ”. In Surfer Beware III:Privacy Policies without Privacy Protection December, Washington, D.C. http://www.epic.org/reports/surfer-beware3.html
-
(1999)
Surfer Beware III: Privacy Policies without Privacy Protection
-
-
-
39
-
-
0012207557
-
Consistent, Yet Anonymous Access with LPWA
-
February
-
Gabber, E., Gibbons, P., Kristol, D., Mataias, Y., and Mayer, A., 1999. Consistent, Yet Anonymous Access with LPWA. Communications of the ACM, February:39–41.
-
(1999)
Communications of the ACM
, pp. 39-41
-
-
Gabber, E.1
Gibbons, P.2
Kristol, D.3
Mataias, Y.4
Mayer, A.5
-
40
-
-
0012164060
-
Hijacking the Web: Cookies Revisited: Continuing the Dialogue on Personal Security and Underlying Privacy Issues
-
April
-
Berghel, H., 2002. Hijacking the Web:Cookies Revisited:Continuing the Dialogue on Personal Security and Underlying Privacy Issues. Communications of the ACM, April:23–28.
-
(2002)
Communications of the ACM
, pp. 23-28
-
-
Berghel, H.1
-
41
-
-
85023816103
-
-
Pew Internet and American Life Project, Trust and Privacy Online: Why Americans Want to Rewrite the Rules, August 2000
-
Pew Internet and American Life Project, Trust and Privacy Online:Why Americans Want to Rewrite the Rules, August 2000 http://www.pewinternet.org/reports/pdfs/PIP_Trust_Privac y_Report.pdf
-
-
-
-
42
-
-
85023864195
-
-
P3P 1.0: A New Standard in Online Privacy
-
P3P 1.0:A New Standard in Online Privacy, http://www.w3c.org/P3P
-
-
-
-
43
-
-
0012126983
-
The Privacy Practices of Web Browser Extensions
-
February
-
Martin, D., Smith, R., Brittain, M., Fetch, I., and Wu, H., 2000. The Privacy Practices of Web Browser Extensions. Communications of the ACM, February:45–50.
-
(2000)
Communications of the ACM
, pp. 45-50
-
-
Martin, D.1
Smith, R.2
Brittain, M.3
Fetch, I.4
Wu, H.5
-
44
-
-
0012170434
-
To Opt-In or Opt-Out? It Depends on the Question
-
February
-
Bellman, S., Johnson, E., and Lohse, G., 2001. To Opt-In or Opt-Out? It Depends on the Question. Communications of the ACM, February:25–27.
-
(2001)
Communications of the ACM
, pp. 25-27
-
-
Bellman, S.1
Johnson, E.2
Lohse, G.3
-
46
-
-
0026912319
-
Recent Applications of Economic Theory in Information Technology Research
-
Bakos, J., and Kemerer, C., 1992. Recent Applications of Economic Theory in Information Technology Research. Decision Support Systems, 8:365–386.
-
(1992)
Decision Support Systems
, vol.8
, pp. 365-386
-
-
Bakos, J.1
Kemerer, C.2
-
48
-
-
84936823933
-
User Acceptance of Computer Technology: A Comparison of Two Theoretical Models
-
August
-
Davis, F., Bagozzi, R., and Warshaw, P., 1989. User Acceptance of Computer Technology:A Comparison of Two Theoretical Models. Management Science, 35 (8) August:985
-
(1989)
Management Science
, vol.35
, Issue.8
, pp. 985
-
-
Davis, F.1
Bagozzi, R.2
Warshaw, P.3
|