메뉴 건너뛰기




Volumn 20, Issue 1, 2003, Pages 8-18

Privacy on the web: An examination of user concerns, technology, and implications for business organizations and individuals

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC COMMERCE; INFORMATION SCIENCE; SOCIETIES AND INSTITUTIONS; WORLD WIDE WEB;

EID: 0037412301     PISSN: 10580530     EISSN: None     Source Type: Journal    
DOI: 10.1201/1078/43203.20.1.20031201/40079.2     Document Type: Article
Times cited : (59)

References (48)
  • 1
    • 0012129087 scopus 로고    scopus 로고
    • David Chaum on Electronic Commerce: How Much Do You Trust Big Brother
    • November/December
    • Chaum, D., 1997. David Chaum on Electronic Commerce:How Much Do You Trust Big Brother. IEEE Internet Computing, November/December:8–16.
    • (1997) IEEE Internet Computing , pp. 8-16
    • Chaum, D.1
  • 2
    • 0033338075 scopus 로고    scopus 로고
    • Bundling Information Goods: Pricing, Profits, and Efficiency
    • December
    • Bakos, J., and Brynjolfsson, E., 1999. Bundling Information Goods:Pricing, Profits, and Efficiency. Management Science, 45 (12) December:1613–1630.
    • (1999) Management Science , vol.45 , Issue.12 , pp. 1613-1630
    • Bakos, J.1    Brynjolfsson, E.2
  • 3
    • 53349102510 scopus 로고
    • Key Information Liability Issues Facing Managers: Software Piracy, Databases and Individual Rights to Privacy
    • June
    • Straub, D., and Collins, R., 1990. Key Information Liability Issues Facing Managers:Software Piracy, Databases and Individual Rights to Privacy. MIS Quarterly, June:143–156.
    • (1990) MIS Quarterly , pp. 143-156
    • Straub, D.1    Collins, R.2
  • 4
    • 85023866215 scopus 로고    scopus 로고
    • Do You Need a CPO?
    • June 1, June 1
    • Joss, M., June 1 2001. “ Do You Need a CPO? ”. In ComputerUser June 1, available at http://www.computeruser.com/articles/2006.1.2.0601.01.html
    • (2001) ComputerUser
    • Joss, M.1
  • 5
    • 85023870344 scopus 로고    scopus 로고
    • Business Week-Harris Poll
    • March 20, issue
    • 2000. Business Week-Harris Poll. Results printed in Business Week, March 20 issue
    • (2000) Results printed in Business Week
  • 6
    • 23044526391 scopus 로고    scopus 로고
    • Ecommerce: Technologies That Do Steal!
    • March
    • Payton, F., 2001. Ecommerce:Technologies That Do Steal!. Decision Line, March:13–14.
    • (2001) Decision Line , pp. 13-14
    • Payton, F.1
  • 7
    • 21944436141 scopus 로고    scopus 로고
    • Ethical Management of Employee E-Mail Privacy
    • Winter
    • Sipior, J., 1998. Ethical Management of Employee E-Mail Privacy. Information Systems Management, 15 Winter:41–48.
    • (1998) Information Systems Management , vol.15 , pp. 41-48
    • Sipior, J.1
  • 8
    • 0000320829 scopus 로고
    • The Right of Privacy
    • March
    • Warren, S., and Brandeis, L., 1890. The Right of Privacy. Harvard Law Review, 4:5 March:193–220.
    • (1890) Harvard Law Review , vol.4 , pp. 193-220
    • Warren, S.1    Brandeis, L.2
  • 12
    • 85023886053 scopus 로고    scopus 로고
    • Information Technology and the Future Enterprise: New Models for Managers
    • Upper Saddle River, NJ: Prentice-Hall
    • Mason, R., Culnan, M., Ang, S., Mason, F., Dickson, G., and DeSantis, G., 2001. “ Information Technology and the Future Enterprise:New Models for Managers ”. In Privacy in the Age of the Internet, Upper Saddle River, NJ:Prentice-Hall.
    • (2001) Privacy in the Age of the Internet
    • Mason, R.1    Culnan, M.2    Ang, S.3    Mason, F.4    Dickson, G.5    DeSantis, G.6
  • 13
    • 0024011426 scopus 로고
    • Information Technology and Dataveillance
    • May
    • Clarke, R., 1988. Information Technology and Dataveillance. Communications of the ACM, May:498–512.
    • (1988) Communications of the ACM , pp. 498-512
    • Clarke, R.1
  • 17
    • 14844319102 scopus 로고    scopus 로고
    • Can P3P Help to Protect Privacy Worldwide?
    • January
    • Grimm, R., and Rossnagel, A., 2000. Can P3P Help to Protect Privacy Worldwide?. ACM Multimedia Workshop, January
    • (2000) ACM Multimedia Workshop
    • Grimm, R.1    Rossnagel, A.2
  • 18
    • 0001501223 scopus 로고
    • How Did They Get My Name?: An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use
    • September
    • Culnan, M., 1993. How Did They Get My Name?:An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. MIS Quarterly, September:341
    • (1993) MIS Quarterly , pp. 341
    • Culnan, M.1
  • 26
    • 55249097295 scopus 로고
    • Four Ethical Issues of the Information Age
    • June
    • Mason, R., 1986. Four Ethical Issues of the Information Age. MIS Quarterly, June:143–156.
    • (1986) MIS Quarterly , pp. 143-156
    • Mason, R.1
  • 27
    • 0012128177 scopus 로고
    • President's Letter
    • May
    • White, J., 1991. President's Letter. Communications of the ACM, 34 (5) May:15–16.
    • (1991) Communications of the ACM , vol.34 , Issue.5 , pp. 15-16
    • White, J.1
  • 28
    • 85023788900 scopus 로고    scopus 로고
    • Privacy Excerpt from “Towards Digital eQuality: The U.S. Government Working Group on Electronic Commerce
    • December
    • Swire, P., 1999. Privacy Excerpt from “Towards Digital eQuality:The U.S. Government Working Group on Electronic Commerce”. 2nd Annual Report, December www.ecommerce.gov
    • (1999) 2nd Annual Report
    • Swire, P.1
  • 29
    • 3042727382 scopus 로고    scopus 로고
    • Privacy Online: Fair Information Practices in the Electronic Marketplace
    • May, May, Washington, D.C
    • Federal Trade Commission. May 2000. “ Privacy Online:Fair Information Practices in the Electronic Marketplace ”. In A Report to Congress May, Washington, D.C.
    • (2000) A Report to Congress
  • 30
    • 85023860389 scopus 로고    scopus 로고
    • An International Comparative Study of Consumer Privacy on the Internet, January
    • Consumer International, Privacy@net:An International Comparative Study of Consumer Privacy on the Internet, January 2001.
    • (2001) Privacy@net
  • 32
    • 85023797725 scopus 로고    scopus 로고
    • An up-to-date summary of pending privacy legislation can be found at the Center for Democracy and Technology Web site located at
    • An up-to-date summary of pending privacy legislation can be found at the Center for Democracy and Technology Web site located at http://www.cdt.org/legislation/107th/privacy
  • 33
    • 0012128179 scopus 로고    scopus 로고
    • HTTP Cookies: Standard, Privacy and Politics
    • November
    • Kristol, D., 2001. HTTP Cookies:Standard, Privacy and Politics. ACM Transactions on Internet Technology, 1 (2) November:151–198.
    • (2001) ACM Transactions on Internet Technology , vol.1 , Issue.2 , pp. 151-198
    • Kristol, D.1
  • 34
    • 85008065261 scopus 로고    scopus 로고
    • Cyberprivacy in the New Millenium
    • January
    • Berghel, H., 2001. Cyberprivacy in the New Millenium. IEEE Computer Magazine, 34 (1) January:133–134.
    • (2001) IEEE Computer Magazine , vol.34 , Issue.1 , pp. 133-134
    • Berghel, H.1
  • 35
    • 0035354413 scopus 로고    scopus 로고
    • Cookies and Web Bugs: What They Are and How They Work Together
    • Summer
    • Harding, W., 2001. Cookies and Web Bugs:What They Are and How They Work Together. Information Systems Management, Boston, 18 (3) Summer:17–25.
    • (2001) Information Systems Management, Boston , vol.18 , Issue.3 , pp. 17-25
    • Harding, W.1
  • 37
    • 0034269416 scopus 로고    scopus 로고
    • Attacking Malicious Code: A Report to the Infosec Research Council
    • September/October
    • McGraw, G., and Morrisett, G., 2000. Attacking Malicious Code:A Report to the Infosec Research Council. IEEE Software, September/October:33–41.
    • (2000) IEEE Software , pp. 33-41
    • McGraw, G.1    Morrisett, G.2
  • 38
    • 85023811528 scopus 로고    scopus 로고
    • Electronic Privacy Information Center
    • December, December, Washington, D.C
    • December 1999. “ Electronic Privacy Information Center ”. In Surfer Beware III:Privacy Policies without Privacy Protection December, Washington, D.C. http://www.epic.org/reports/surfer-beware3.html
    • (1999) Surfer Beware III: Privacy Policies without Privacy Protection
  • 40
    • 0012164060 scopus 로고    scopus 로고
    • Hijacking the Web: Cookies Revisited: Continuing the Dialogue on Personal Security and Underlying Privacy Issues
    • April
    • Berghel, H., 2002. Hijacking the Web:Cookies Revisited:Continuing the Dialogue on Personal Security and Underlying Privacy Issues. Communications of the ACM, April:23–28.
    • (2002) Communications of the ACM , pp. 23-28
    • Berghel, H.1
  • 41
    • 85023816103 scopus 로고    scopus 로고
    • Pew Internet and American Life Project, Trust and Privacy Online: Why Americans Want to Rewrite the Rules, August 2000
    • Pew Internet and American Life Project, Trust and Privacy Online:Why Americans Want to Rewrite the Rules, August 2000 http://www.pewinternet.org/reports/pdfs/PIP_Trust_Privac y_Report.pdf
  • 42
    • 85023864195 scopus 로고    scopus 로고
    • P3P 1.0: A New Standard in Online Privacy
    • P3P 1.0:A New Standard in Online Privacy, http://www.w3c.org/P3P
  • 44
    • 0012170434 scopus 로고    scopus 로고
    • To Opt-In or Opt-Out? It Depends on the Question
    • February
    • Bellman, S., Johnson, E., and Lohse, G., 2001. To Opt-In or Opt-Out? It Depends on the Question. Communications of the ACM, February:25–27.
    • (2001) Communications of the ACM , pp. 25-27
    • Bellman, S.1    Johnson, E.2    Lohse, G.3
  • 46
    • 0026912319 scopus 로고
    • Recent Applications of Economic Theory in Information Technology Research
    • Bakos, J., and Kemerer, C., 1992. Recent Applications of Economic Theory in Information Technology Research. Decision Support Systems, 8:365–386.
    • (1992) Decision Support Systems , vol.8 , pp. 365-386
    • Bakos, J.1    Kemerer, C.2
  • 48
    • 84936823933 scopus 로고
    • User Acceptance of Computer Technology: A Comparison of Two Theoretical Models
    • August
    • Davis, F., Bagozzi, R., and Warshaw, P., 1989. User Acceptance of Computer Technology:A Comparison of Two Theoretical Models. Management Science, 35 (8) August:985
    • (1989) Management Science , vol.35 , Issue.8 , pp. 985
    • Davis, F.1    Bagozzi, R.2    Warshaw, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.